Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment_copy28476450.exe

Overview

General Information

Sample Name:Payment_copy28476450.exe
Analysis ID:753423
MD5:70e90926399154c2708801a73cf53d99
SHA1:0eaff8f1cde17a392d9e7935bae96f21c91acc3c
SHA256:c36de6d07a8ce4407cb59a275dbf8c04d05844903bb6d566f295ccd13a2d4ce6
Tags:exeloki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Maps a DLL or memory area into another process
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
Executable has a suspicious name (potential lure to open the executable)
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Enables debug privileges
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • Payment_copy28476450.exe (PID: 160 cmdline: C:\Users\user\Desktop\Payment_copy28476450.exe MD5: 70E90926399154C2708801A73CF53D99)
    • wcycejenv.exe (PID: 588 cmdline: "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d MD5: 3182BEF520A1E9F52BE3755C25E4C3B0)
      • conhost.exe (PID: 584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
      • wcycejenv.exe (PID: 5332 cmdline: "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d MD5: 3182BEF520A1E9F52BE3755C25E4C3B0)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x17936:$f1: FileZilla\recentservers.xml
          • 0x17976:$f2: FileZilla\sitemanager.xml
          • 0x15be6:$b2: Mozilla\Firefox\Profiles
          • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x15afa:$s4: logins.json
          • 0x169a4:$s6: wand.dat
          • 0x15424:$a1: username_value
          • 0x15414:$a2: password_value
          • 0x15a5f:$a3: encryptedUsername
          • 0x15acc:$a3: encryptedUsername
          • 0x15a72:$a4: encryptedPassword
          • 0x15ae0:$a4: encryptedPassword
          00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x187f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          Click to see the 24 entries
          SourceRuleDescriptionAuthorStrings
          3.0.wcycejenv.exe.400000.4.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
          • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          3.2.wcycejenv.exe.400000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            3.2.wcycejenv.exe.400000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              3.2.wcycejenv.exe.400000.0.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                3.2.wcycejenv.exe.400000.0.raw.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                • 0x17936:$f1: FileZilla\recentservers.xml
                • 0x17976:$f2: FileZilla\sitemanager.xml
                • 0x15be6:$b2: Mozilla\Firefox\Profiles
                • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x15afa:$s4: logins.json
                • 0x169a4:$s6: wand.dat
                • 0x15424:$a1: username_value
                • 0x15414:$a2: password_value
                • 0x15a5f:$a3: encryptedUsername
                • 0x15acc:$a3: encryptedUsername
                • 0x15a72:$a4: encryptedPassword
                • 0x15ae0:$a4: encryptedPassword
                Click to see the 35 entries
                No Sigma rule has matched
                Timestamp:192.168.2.695.213.216.20249737802025381 11/24/22-19:55:31.199874
                SID:2025381
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249748802021641 11/24/22-19:55:53.130311
                SID:2021641
                Source Port:49748
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249750802825766 11/24/22-19:55:57.329298
                SID:2825766
                Source Port:49750
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249751802021641 11/24/22-19:55:59.376338
                SID:2021641
                Source Port:49751
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.859881532014169 11/24/22-19:55:09.708351
                SID:2014169
                Source Port:59881
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:95.213.216.202192.168.2.680497332025483 11/24/22-19:55:24.906100
                SID:2025483
                Source Port:80
                Destination Port:49733
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497352025483 11/24/22-19:55:28.867256
                SID:2025483
                Source Port:80
                Destination Port:49735
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249736802024318 11/24/22-19:55:29.163584
                SID:2024318
                Source Port:49736
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497372025483 11/24/22-19:55:32.908191
                SID:2025483
                Source Port:80
                Destination Port:49737
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497392025483 11/24/22-19:55:36.924861
                SID:2025483
                Source Port:80
                Destination Port:49739
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249754802024318 11/24/22-19:56:04.818902
                SID:2024318
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249736802024313 11/24/22-19:55:29.163584
                SID:2024313
                Source Port:49736
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856122532014169 11/24/22-19:54:54.866804
                SID:2014169
                Source Port:56122
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249754802024313 11/24/22-19:56:04.818902
                SID:2024313
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249711802024313 11/24/22-19:54:38.624655
                SID:2024313
                Source Port:49711
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249705802021641 11/24/22-19:54:27.228813
                SID:2021641
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249719802025381 11/24/22-19:54:53.033944
                SID:2025381
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249729802825766 11/24/22-19:55:13.852615
                SID:2825766
                Source Port:49729
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249722802025381 11/24/22-19:54:59.769485
                SID:2025381
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249747802825766 11/24/22-19:55:51.131718
                SID:2825766
                Source Port:49747
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249711802024318 11/24/22-19:54:38.624655
                SID:2024318
                Source Port:49711
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249740802025381 11/24/22-19:55:37.776321
                SID:2025381
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249750802025381 11/24/22-19:55:57.329298
                SID:2025381
                Source Port:49750
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249737802825766 11/24/22-19:55:31.199874
                SID:2825766
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249714802825766 11/24/22-19:54:45.091814
                SID:2825766
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.850343532014169 11/24/22-19:55:13.761219
                SID:2014169
                Source Port:50343
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249741802021641 11/24/22-19:55:39.990050
                SID:2021641
                Source Port:49741
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249709802025381 11/24/22-19:54:33.518227
                SID:2025381
                Source Port:49709
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249723802021641 11/24/22-19:55:01.692450
                SID:2021641
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249727802025381 11/24/22-19:55:09.788187
                SID:2025381
                Source Port:49727
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249700802021641 11/24/22-19:54:18.249997
                SID:2021641
                Source Port:49700
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856569532014169 11/24/22-19:55:23.105213
                SID:2014169
                Source Port:56569
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249719802825766 11/24/22-19:54:53.033944
                SID:2825766
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249732802825766 11/24/22-19:55:21.169470
                SID:2825766
                Source Port:49732
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.853943532014169 11/24/22-19:55:03.645658
                SID:2014169
                Source Port:53943
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249755802025381 11/24/22-19:56:06.881877
                SID:2025381
                Source Port:49755
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.855629532014169 11/24/22-19:55:19.049102
                SID:2014169
                Source Port:55629
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:95.213.216.202192.168.2.680497312025483 11/24/22-19:55:20.867899
                SID:2025483
                Source Port:80
                Destination Port:49731
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249755802825766 11/24/22-19:56:06.881877
                SID:2825766
                Source Port:49755
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249701802024313 11/24/22-19:54:22.087876
                SID:2024313
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249732802025381 11/24/22-19:55:21.169470
                SID:2025381
                Source Port:49732
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.860130532014169 11/24/22-19:55:57.225226
                SID:2014169
                Source Port:60130
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249718802024313 11/24/22-19:54:50.807735
                SID:2024313
                Source Port:49718
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249701802024318 11/24/22-19:54:22.087876
                SID:2024318
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249699802024318 11/24/22-19:54:15.956073
                SID:2024318
                Source Port:49699
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497402025483 11/24/22-19:55:39.709470
                SID:2025483
                Source Port:80
                Destination Port:49740
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497422025483 11/24/22-19:55:42.590814
                SID:2025483
                Source Port:80
                Destination Port:49742
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249718802024318 11/24/22-19:54:50.807735
                SID:2024318
                Source Port:49718
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249699802024313 11/24/22-19:54:15.956073
                SID:2024313
                Source Port:49699
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249702802025381 11/24/22-19:54:25.054966
                SID:2025381
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.861609532014169 11/24/22-19:54:59.613442
                SID:2014169
                Source Port:61609
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:95.213.216.202192.168.2.680497282025483 11/24/22-19:55:13.560423
                SID:2025483
                Source Port:80
                Destination Port:49728
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249710802021641 11/24/22-19:54:35.914327
                SID:2021641
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249716802024318 11/24/22-19:54:48.704817
                SID:2024318
                Source Port:49716
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862958532014169 11/24/22-19:55:40.875534
                SID:2014169
                Source Port:62958
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.864382532014169 11/24/22-19:54:15.835585
                SID:2014169
                Source Port:64382
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249716802024313 11/24/22-19:54:48.704817
                SID:2024313
                Source Port:49716
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249707802021641 11/24/22-19:54:31.276699
                SID:2021641
                Source Port:49707
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249739802825766 11/24/22-19:55:35.259290
                SID:2825766
                Source Port:49739
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497242025483 11/24/22-19:55:05.403255
                SID:2025483
                Source Port:80
                Destination Port:49724
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.849232532014169 11/24/22-19:55:31.114753
                SID:2014169
                Source Port:49232
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.862848532014169 11/24/22-19:55:44.925533
                SID:2014169
                Source Port:62848
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249713802021641 11/24/22-19:54:43.021097
                SID:2021641
                Source Port:49713
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249745802825766 11/24/22-19:55:47.082758
                SID:2825766
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249731802024318 11/24/22-19:55:19.158567
                SID:2024318
                Source Port:49731
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249706802825766 11/24/22-19:54:29.062049
                SID:2825766
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249749802024313 11/24/22-19:55:55.139215
                SID:2024313
                Source Port:49749
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249709802825766 11/24/22-19:54:33.518227
                SID:2825766
                Source Port:49709
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249731802024313 11/24/22-19:55:19.158567
                SID:2024313
                Source Port:49731
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249746802024313 11/24/22-19:55:49.078874
                SID:2024313
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249742802825766 11/24/22-19:55:40.973542
                SID:2825766
                Source Port:49742
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249749802024318 11/24/22-19:55:55.139215
                SID:2024318
                Source Port:49749
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497072025483 11/24/22-19:54:33.040572
                SID:2025483
                Source Port:80
                Destination Port:49707
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249712802825766 11/24/22-19:54:40.926341
                SID:2825766
                Source Port:49712
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249752802024313 11/24/22-19:56:01.434635
                SID:2024313
                Source Port:49752
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249746802024318 11/24/22-19:55:49.078874
                SID:2024318
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249752802024318 11/24/22-19:56:01.434635
                SID:2024318
                Source Port:49752
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249728802021641 11/24/22-19:55:11.780324
                SID:2021641
                Source Port:49728
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249743802021641 11/24/22-19:55:42.875605
                SID:2021641
                Source Port:49743
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249738802024313 11/24/22-19:55:33.192742
                SID:2024313
                Source Port:49738
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862910532014169 11/24/22-19:54:44.985895
                SID:2014169
                Source Port:62910
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249724802025381 11/24/22-19:55:03.741584
                SID:2025381
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249738802024318 11/24/22-19:55:33.192742
                SID:2024318
                Source Port:49738
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249740802825766 11/24/22-19:55:37.776321
                SID:2825766
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249744802024313 11/24/22-19:55:45.028740
                SID:2024313
                Source Port:49744
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249697802825766 11/24/22-19:54:11.348011
                SID:2825766
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856331532014169 11/24/22-19:54:31.195563
                SID:2014169
                Source Port:56331
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.849448532014169 11/24/22-19:54:35.800639
                SID:2014169
                Source Port:49448
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249744802024318 11/24/22-19:55:45.028740
                SID:2024318
                Source Port:49744
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856750532014169 11/24/22-19:56:03.361289
                SID:2014169
                Source Port:56750
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.850506532014169 11/24/22-19:54:33.429766
                SID:2014169
                Source Port:50506
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.859752532014169 11/24/22-19:55:35.135406
                SID:2014169
                Source Port:59752
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249721802021641 11/24/22-19:54:56.896268
                SID:2021641
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249729802025381 11/24/22-19:55:13.852615
                SID:2025381
                Source Port:49729
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249698802025381 11/24/22-19:54:13.981663
                SID:2025381
                Source Port:49698
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249730802025381 11/24/22-19:55:16.067382
                SID:2025381
                Source Port:49730
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862732532014169 11/24/22-19:55:59.286288
                SID:2014169
                Source Port:62732
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.859336532014169 11/24/22-19:56:04.733170
                SID:2014169
                Source Port:59336
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249734802825766 11/24/22-19:55:25.189583
                SID:2825766
                Source Port:49734
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.865198532014169 11/24/22-19:54:42.928676
                SID:2014169
                Source Port:65198
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249735802025381 11/24/22-19:55:27.170416
                SID:2025381
                Source Port:49735
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497542025483 11/24/22-19:56:06.628427
                SID:2025483
                Source Port:80
                Destination Port:49754
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249715802021641 11/24/22-19:54:47.405096
                SID:2021641
                Source Port:49715
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497192025483 11/24/22-19:54:54.654090
                SID:2025483
                Source Port:80
                Destination Port:49719
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497522025483 11/24/22-19:56:03.175717
                SID:2025483
                Source Port:80
                Destination Port:49752
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249753802825766 11/24/22-19:56:03.443038
                SID:2825766
                Source Port:49753
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.851321532014169 11/24/22-19:55:51.025349
                SID:2014169
                Source Port:51321
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249697802025381 11/24/22-19:54:11.348011
                SID:2025381
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249707802825766 11/24/22-19:54:31.276699
                SID:2825766
                Source Port:49707
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249744802825766 11/24/22-19:55:45.028740
                SID:2825766
                Source Port:49744
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249749802025381 11/24/22-19:55:55.139215
                SID:2025381
                Source Port:49749
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497162025483 11/24/22-19:54:50.512832
                SID:2025483
                Source Port:80
                Destination Port:49716
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497142025483 11/24/22-19:54:46.656019
                SID:2025483
                Source Port:80
                Destination Port:49714
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249754802021641 11/24/22-19:56:04.818902
                SID:2021641
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249705802024318 11/24/22-19:54:27.228813
                SID:2024318
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249710802025381 11/24/22-19:54:35.914327
                SID:2025381
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497112025483 11/24/22-19:54:39.580169
                SID:2025483
                Source Port:80
                Destination Port:49711
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497132025483 11/24/22-19:54:44.610304
                SID:2025483
                Source Port:80
                Destination Port:49713
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249735802825766 11/24/22-19:55:27.170416
                SID:2825766
                Source Port:49735
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249752802025381 11/24/22-19:56:01.434635
                SID:2025381
                Source Port:49752
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862766532014169 11/24/22-19:55:55.046216
                SID:2014169
                Source Port:62766
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249705802024313 11/24/22-19:54:27.228813
                SID:2024313
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249710802825766 11/24/22-19:54:35.914327
                SID:2825766
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249707802025381 11/24/22-19:54:31.276699
                SID:2025381
                Source Port:49707
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.864601532014169 11/24/22-19:54:24.912578
                SID:2014169
                Source Port:64601
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249706802024313 11/24/22-19:54:29.062049
                SID:2024313
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249735802021641 11/24/22-19:55:27.170416
                SID:2021641
                Source Port:49735
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249706802024318 11/24/22-19:54:29.062049
                SID:2024318
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852481532014169 11/24/22-19:55:01.607307
                SID:2014169
                Source Port:52481
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249726802825766 11/24/22-19:55:07.738200
                SID:2825766
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249754802825766 11/24/22-19:56:04.818902
                SID:2825766
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249733802025381 11/24/22-19:55:23.201569
                SID:2025381
                Source Port:49733
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249753802021641 11/24/22-19:56:03.443038
                SID:2021641
                Source Port:49753
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249724802024313 11/24/22-19:55:03.741584
                SID:2024313
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.864404532014169 11/24/22-19:55:42.774058
                SID:2014169
                Source Port:64404
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249726802025381 11/24/22-19:55:07.738200
                SID:2025381
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249747802024318 11/24/22-19:55:51.131718
                SID:2024318
                Source Port:49747
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249725802825766 11/24/22-19:55:05.694279
                SID:2825766
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249712802021641 11/24/22-19:54:40.926341
                SID:2021641
                Source Port:49712
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249747802024313 11/24/22-19:55:51.131718
                SID:2024313
                Source Port:49747
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852865532014169 11/24/22-19:55:37.629169
                SID:2014169
                Source Port:52865
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:95.213.216.202192.168.2.680497462025483 11/24/22-19:55:50.859980
                SID:2025483
                Source Port:80
                Destination Port:49746
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249699802021641 11/24/22-19:54:15.956073
                SID:2021641
                Source Port:49699
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249724802024318 11/24/22-19:55:03.741584
                SID:2024318
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497552025483 11/24/22-19:56:08.689068
                SID:2025483
                Source Port:80
                Destination Port:49755
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249719802021641 11/24/22-19:54:53.033944
                SID:2021641
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497442025483 11/24/22-19:55:46.796463
                SID:2025483
                Source Port:80
                Destination Port:49744
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497272025483 11/24/22-19:55:11.470809
                SID:2025483
                Source Port:80
                Destination Port:49727
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.863863532014169 11/24/22-19:54:46.995919
                SID:2014169
                Source Port:63863
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249716802021641 11/24/22-19:54:48.704817
                SID:2021641
                Source Port:49716
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249751802025381 11/24/22-19:55:59.376338
                SID:2025381
                Source Port:49751
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249714802025381 11/24/22-19:54:45.091814
                SID:2025381
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249722802021641 11/24/22-19:54:59.769485
                SID:2021641
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497222025483 11/24/22-19:55:01.407205
                SID:2025483
                Source Port:80
                Destination Port:49722
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249720802025381 11/24/22-19:54:54.960633
                SID:2025381
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.853203532014169 11/24/22-19:54:18.123294
                SID:2014169
                Source Port:53203
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249700802825766 11/24/22-19:54:18.249997
                SID:2825766
                Source Port:49700
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249737802024318 11/24/22-19:55:31.199874
                SID:2024318
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249740802024313 11/24/22-19:55:37.776321
                SID:2024313
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249742802025381 11/24/22-19:55:40.973542
                SID:2025381
                Source Port:49742
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497052025483 11/24/22-19:54:28.634655
                SID:2025483
                Source Port:80
                Destination Port:49705
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249731802021641 11/24/22-19:55:19.158567
                SID:2021641
                Source Port:49731
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.857686532014169 11/24/22-19:54:13.553924
                SID:2014169
                Source Port:57686
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.858595532014169 11/24/22-19:54:28.961973
                SID:2014169
                Source Port:58595
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249736802025381 11/24/22-19:55:29.163584
                SID:2025381
                Source Port:49736
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249745802025381 11/24/22-19:55:47.082758
                SID:2025381
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.857515532014169 11/24/22-19:55:48.986225
                SID:2014169
                Source Port:57515
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249734802024318 11/24/22-19:55:25.189583
                SID:2024318
                Source Port:49734
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497002025483 11/24/22-19:54:20.029122
                SID:2025483
                Source Port:80
                Destination Port:49700
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249725802021641 11/24/22-19:55:05.694279
                SID:2021641
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249734802024313 11/24/22-19:55:25.189583
                SID:2024313
                Source Port:49734
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249743802024318 11/24/22-19:55:42.875605
                SID:2024318
                Source Port:49743
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249728802024318 11/24/22-19:55:11.780324
                SID:2024318
                Source Port:49728
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249737802024313 11/24/22-19:55:31.199874
                SID:2024313
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249728802024313 11/24/22-19:55:11.780324
                SID:2024313
                Source Port:49728
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249739802025381 11/24/22-19:55:35.259290
                SID:2025381
                Source Port:49739
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.855956532014169 11/24/22-19:55:46.990731
                SID:2014169
                Source Port:55956
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249743802024313 11/24/22-19:55:42.875605
                SID:2024313
                Source Port:49743
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249709802024313 11/24/22-19:54:33.518227
                SID:2024313
                Source Port:49709
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249738802021641 11/24/22-19:55:33.192742
                SID:2021641
                Source Port:49738
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.859082532014169 11/24/22-19:54:38.013432
                SID:2014169
                Source Port:59082
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249740802024318 11/24/22-19:55:37.776321
                SID:2024318
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249722802825766 11/24/22-19:54:59.769485
                SID:2825766
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.851530532014169 11/24/22-19:54:52.685795
                SID:2014169
                Source Port:51530
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249701802025381 11/24/22-19:54:22.087876
                SID:2025381
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249723802025381 11/24/22-19:55:01.692450
                SID:2025381
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249721802024313 11/24/22-19:54:56.896268
                SID:2024313
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249750802021641 11/24/22-19:55:57.329298
                SID:2021641
                Source Port:49750
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249715802024318 11/24/22-19:54:47.405096
                SID:2024318
                Source Port:49715
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497302025483 11/24/22-19:55:17.735946
                SID:2025483
                Source Port:80
                Destination Port:49730
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249716802825766 11/24/22-19:54:48.704817
                SID:2825766
                Source Port:49716
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249721802024318 11/24/22-19:54:56.896268
                SID:2024318
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.860032532014169 11/24/22-19:55:29.068969
                SID:2014169
                Source Port:60032
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249744802021641 11/24/22-19:55:45.028740
                SID:2021641
                Source Port:49744
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497412025483 11/24/22-19:55:40.700457
                SID:2025483
                Source Port:80
                Destination Port:49741
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497492025483 11/24/22-19:55:57.050677
                SID:2025483
                Source Port:80
                Destination Port:49749
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249709802024318 11/24/22-19:54:33.518227
                SID:2024318
                Source Port:49709
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249715802024313 11/24/22-19:54:47.405096
                SID:2024313
                Source Port:49715
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.858917532014169 11/24/22-19:55:11.700175
                SID:2014169
                Source Port:58917
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249745802024318 11/24/22-19:55:47.082758
                SID:2024318
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497342025483 11/24/22-19:55:26.886961
                SID:2025483
                Source Port:80
                Destination Port:49734
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249742802021641 11/24/22-19:55:40.973542
                SID:2021641
                Source Port:49742
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497362025483 11/24/22-19:55:30.902353
                SID:2025483
                Source Port:80
                Destination Port:49736
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497382025483 11/24/22-19:55:34.897313
                SID:2025483
                Source Port:80
                Destination Port:49738
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497322025483 11/24/22-19:55:22.836179
                SID:2025483
                Source Port:80
                Destination Port:49732
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249739802021641 11/24/22-19:55:35.259290
                SID:2021641
                Source Port:49739
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249741802825766 11/24/22-19:55:39.990050
                SID:2825766
                Source Port:49741
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249728802025381 11/24/22-19:55:11.780324
                SID:2025381
                Source Port:49728
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249745802024313 11/24/22-19:55:47.082758
                SID:2024313
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249713802825766 11/24/22-19:54:43.021097
                SID:2825766
                Source Port:49713
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249746802025381 11/24/22-19:55:49.078874
                SID:2025381
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.853731532014169 11/24/22-19:54:11.254500
                SID:2014169
                Source Port:53731
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249702802024318 11/24/22-19:54:25.054966
                SID:2024318
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249713802025381 11/24/22-19:54:43.021097
                SID:2025381
                Source Port:49713
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249738802825766 11/24/22-19:55:33.192742
                SID:2825766
                Source Port:49738
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.861089532014169 11/24/22-19:55:53.045222
                SID:2014169
                Source Port:61089
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249714802021641 11/24/22-19:54:45.091814
                SID:2021641
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249720802024313 11/24/22-19:54:54.960633
                SID:2024313
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249702802024313 11/24/22-19:54:25.054966
                SID:2024313
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249720802024318 11/24/22-19:54:54.960633
                SID:2024318
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249731802025381 11/24/22-19:55:19.158567
                SID:2025381
                Source Port:49731
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249735802024313 11/24/22-19:55:27.170416
                SID:2024313
                Source Port:49735
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249698802024317 11/24/22-19:54:13.981663
                SID:2024317
                Source Port:49698
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249698802024312 11/24/22-19:54:13.981663
                SID:2024312
                Source Port:49698
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249729802021641 11/24/22-19:55:13.852615
                SID:2021641
                Source Port:49729
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249721802025381 11/24/22-19:54:56.896268
                SID:2025381
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249731802825766 11/24/22-19:55:19.158567
                SID:2825766
                Source Port:49731
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249712802024313 11/24/22-19:54:40.926341
                SID:2024313
                Source Port:49712
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249712802024318 11/24/22-19:54:40.926341
                SID:2024318
                Source Port:49712
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249735802024318 11/24/22-19:55:27.170416
                SID:2024318
                Source Port:49735
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249724802021641 11/24/22-19:55:03.741584
                SID:2021641
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249748802825766 11/24/22-19:55:53.130311
                SID:2825766
                Source Port:49748
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249753802024318 11/24/22-19:56:03.443038
                SID:2024318
                Source Port:49753
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249753802024313 11/24/22-19:56:03.443038
                SID:2024313
                Source Port:49753
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249730802024318 11/24/22-19:55:16.067382
                SID:2024318
                Source Port:49730
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249747802021641 11/24/22-19:55:51.131718
                SID:2021641
                Source Port:49747
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249738802025381 11/24/22-19:55:33.192742
                SID:2025381
                Source Port:49738
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249730802024313 11/24/22-19:55:16.067382
                SID:2024313
                Source Port:49730
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249706802021641 11/24/22-19:54:29.062049
                SID:2021641
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249705802025381 11/24/22-19:54:27.228813
                SID:2025381
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.863229532014169 11/24/22-19:54:48.619009
                SID:2014169
                Source Port:63229
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249721802825766 11/24/22-19:54:56.896268
                SID:2825766
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249722802024313 11/24/22-19:54:59.769485
                SID:2024313
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497432025483 11/24/22-19:55:44.744520
                SID:2025483
                Source Port:80
                Destination Port:49743
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.849786532014169 11/24/22-19:54:27.135932
                SID:2014169
                Source Port:49786
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249725802024313 11/24/22-19:55:05.694279
                SID:2024313
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249719802024318 11/24/22-19:54:53.033944
                SID:2024318
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249722802024318 11/24/22-19:54:59.769485
                SID:2024318
                Source Port:49722
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249725802024318 11/24/22-19:55:05.694279
                SID:2024318
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856123532014169 11/24/22-19:55:33.111651
                SID:2014169
                Source Port:56123
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249697802021641 11/24/22-19:54:11.348011
                SID:2021641
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249711802025381 11/24/22-19:54:38.624655
                SID:2025381
                Source Port:49711
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249736802825766 11/24/22-19:55:29.163584
                SID:2825766
                Source Port:49736
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497292025483 11/24/22-19:55:15.362841
                SID:2025483
                Source Port:80
                Destination Port:49729
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497252025483 11/24/22-19:55:07.447890
                SID:2025483
                Source Port:80
                Destination Port:49725
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497212025483 11/24/22-19:54:58.247548
                SID:2025483
                Source Port:80
                Destination Port:49721
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249750802024318 11/24/22-19:55:57.329298
                SID:2024318
                Source Port:49750
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249737802021641 11/24/22-19:55:31.199874
                SID:2021641
                Source Port:49737
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249751802825766 11/24/22-19:55:59.376338
                SID:2825766
                Source Port:49751
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249740802021641 11/24/22-19:55:37.776321
                SID:2021641
                Source Port:49740
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497022025483 11/24/22-19:54:26.773719
                SID:2025483
                Source Port:80
                Destination Port:49702
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497062025483 11/24/22-19:54:30.867234
                SID:2025483
                Source Port:80
                Destination Port:49706
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249754802025381 11/24/22-19:56:04.818902
                SID:2025381
                Source Port:49754
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249699802825766 11/24/22-19:54:15.956073
                SID:2825766
                Source Port:49699
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249719802024313 11/24/22-19:54:53.033944
                SID:2024313
                Source Port:49719
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249734802021641 11/24/22-19:55:25.189583
                SID:2021641
                Source Port:49734
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249748802025381 11/24/22-19:55:53.130311
                SID:2025381
                Source Port:49748
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249715802825766 11/24/22-19:54:47.405096
                SID:2825766
                Source Port:49715
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249732802021641 11/24/22-19:55:21.169470
                SID:2021641
                Source Port:49732
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249709802021641 11/24/22-19:54:33.518227
                SID:2021641
                Source Port:49709
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249755802024318 11/24/22-19:56:06.881877
                SID:2024318
                Source Port:49755
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249741802025381 11/24/22-19:55:39.990050
                SID:2025381
                Source Port:49741
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249755802024313 11/24/22-19:56:06.881877
                SID:2024313
                Source Port:49755
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249723802825766 11/24/22-19:55:01.692450
                SID:2825766
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.865044532014169 11/24/22-19:55:27.077654
                SID:2014169
                Source Port:65044
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249726802021641 11/24/22-19:55:07.738200
                SID:2021641
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249718802025381 11/24/22-19:54:50.807735
                SID:2025381
                Source Port:49718
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249727802024313 11/24/22-19:55:09.788187
                SID:2024313
                Source Port:49727
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249750802024313 11/24/22-19:55:57.329298
                SID:2024313
                Source Port:49750
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249727802024318 11/24/22-19:55:09.788187
                SID:2024318
                Source Port:49727
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249700802025381 11/24/22-19:54:18.249997
                SID:2025381
                Source Port:49700
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249733802024313 11/24/22-19:55:23.201569
                SID:2024313
                Source Port:49733
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497472025483 11/24/22-19:55:52.860690
                SID:2025483
                Source Port:80
                Destination Port:49747
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856086532014169 11/24/22-19:55:05.605111
                SID:2014169
                Source Port:56086
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249728802825766 11/24/22-19:55:11.780324
                SID:2825766
                Source Port:49728
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249733802024318 11/24/22-19:55:23.201569
                SID:2024318
                Source Port:49733
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497502025483 11/24/22-19:55:59.104900
                SID:2025483
                Source Port:80
                Destination Port:49750
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249734802025381 11/24/22-19:55:25.189583
                SID:2025381
                Source Port:49734
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249742802024318 11/24/22-19:55:40.973542
                SID:2024318
                Source Port:49742
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497532025483 11/24/22-19:56:04.545301
                SID:2025483
                Source Port:80
                Destination Port:49753
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497182025483 11/24/22-19:54:52.477982
                SID:2025483
                Source Port:80
                Destination Port:49718
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249751802024313 11/24/22-19:55:59.376338
                SID:2024313
                Source Port:49751
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.860690532014169 11/24/22-19:56:01.353337
                SID:2014169
                Source Port:60690
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249748802024313 11/24/22-19:55:53.130311
                SID:2024313
                Source Port:49748
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249701802825766 11/24/22-19:54:22.087876
                SID:2825766
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.854903532014169 11/24/22-19:54:50.721248
                SID:2014169
                Source Port:54903
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249743802025381 11/24/22-19:55:42.875605
                SID:2025381
                Source Port:49743
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249742802024313 11/24/22-19:55:40.973542
                SID:2024313
                Source Port:49742
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497152025483 11/24/22-19:54:48.216785
                SID:2025483
                Source Port:80
                Destination Port:49715
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249736802021641 11/24/22-19:55:29.163584
                SID:2021641
                Source Port:49736
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249739802024313 11/24/22-19:55:35.259290
                SID:2024313
                Source Port:49739
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249739802024318 11/24/22-19:55:35.259290
                SID:2024318
                Source Port:49739
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249745802021641 11/24/22-19:55:47.082758
                SID:2021641
                Source Port:49745
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249748802024318 11/24/22-19:55:53.130311
                SID:2024318
                Source Port:49748
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680496992025483 11/24/22-19:54:17.569674
                SID:2025483
                Source Port:80
                Destination Port:49699
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497102025483 11/24/22-19:54:37.501776
                SID:2025483
                Source Port:80
                Destination Port:49710
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497122025483 11/24/22-19:54:42.610242
                SID:2025483
                Source Port:80
                Destination Port:49712
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.856547532014169 11/24/22-19:55:07.655761
                SID:2014169
                Source Port:56547
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249714802024313 11/24/22-19:54:45.091814
                SID:2024313
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249720802021641 11/24/22-19:54:54.960633
                SID:2021641
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249714802024318 11/24/22-19:54:45.091814
                SID:2024318
                Source Port:49714
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249725802025381 11/24/22-19:55:05.694279
                SID:2025381
                Source Port:49725
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249702802021641 11/24/22-19:54:25.054966
                SID:2021641
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249711802021641 11/24/22-19:54:38.624655
                SID:2021641
                Source Port:49711
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.859504532014169 11/24/22-19:54:40.838615
                SID:2014169
                Source Port:59504
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249716802025381 11/24/22-19:54:48.704817
                SID:2025381
                Source Port:49716
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249698802021641 11/24/22-19:54:13.981663
                SID:2021641
                Source Port:49698
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249729802024318 11/24/22-19:55:13.852615
                SID:2024318
                Source Port:49729
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249700802024318 11/24/22-19:54:18.249997
                SID:2024318
                Source Port:49700
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249715802025381 11/24/22-19:54:47.405096
                SID:2025381
                Source Port:49715
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249723802024318 11/24/22-19:55:01.692450
                SID:2024318
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249729802024313 11/24/22-19:55:13.852615
                SID:2024313
                Source Port:49729
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249723802024313 11/24/22-19:55:01.692450
                SID:2024313
                Source Port:49723
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852556532014169 11/24/22-19:54:56.722023
                SID:2014169
                Source Port:52556
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249741802024318 11/24/22-19:55:39.990050
                SID:2024318
                Source Port:49741
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249749802825766 11/24/22-19:55:55.139215
                SID:2825766
                Source Port:49749
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249741802024313 11/24/22-19:55:39.990050
                SID:2024313
                Source Port:49741
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249700802024313 11/24/22-19:54:18.249997
                SID:2024313
                Source Port:49700
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497202025483 11/24/22-19:54:56.488535
                SID:2025483
                Source Port:80
                Destination Port:49720
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249718802021641 11/24/22-19:54:50.807735
                SID:2021641
                Source Port:49718
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249701802021641 11/24/22-19:54:22.087876
                SID:2021641
                Source Port:49701
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497482025483 11/24/22-19:55:54.888388
                SID:2025483
                Source Port:80
                Destination Port:49748
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249720802825766 11/24/22-19:54:54.960633
                SID:2825766
                Source Port:49720
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.853107532014169 11/24/22-19:54:21.991089
                SID:2014169
                Source Port:53107
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249702802825766 11/24/22-19:54:25.054966
                SID:2825766
                Source Port:49702
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249744802025381 11/24/22-19:55:45.028740
                SID:2025381
                Source Port:49744
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497512025483 11/24/22-19:56:01.147373
                SID:2025483
                Source Port:80
                Destination Port:49751
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249730802021641 11/24/22-19:55:16.067382
                SID:2021641
                Source Port:49730
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249743802825766 11/24/22-19:55:42.875605
                SID:2825766
                Source Port:49743
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249710802024318 11/24/22-19:54:35.914327
                SID:2024318
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249724802825766 11/24/22-19:55:03.741584
                SID:2825766
                Source Port:49724
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249727802825766 11/24/22-19:55:09.788187
                SID:2825766
                Source Port:49727
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497452025483 11/24/22-19:55:48.824554
                SID:2025483
                Source Port:80
                Destination Port:49745
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249713802024318 11/24/22-19:54:43.021097
                SID:2024318
                Source Port:49713
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249710802024313 11/24/22-19:54:35.914327
                SID:2024313
                Source Port:49710
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249718802825766 11/24/22-19:54:50.807735
                SID:2825766
                Source Port:49718
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497092025483 11/24/22-19:54:35.412652
                SID:2025483
                Source Port:80
                Destination Port:49709
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497232025483 11/24/22-19:55:03.460307
                SID:2025483
                Source Port:80
                Destination Port:49723
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249697802024312 11/24/22-19:54:11.348011
                SID:2024312
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249707802024313 11/24/22-19:54:31.276699
                SID:2024313
                Source Port:49707
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.862520532014169 11/24/22-19:55:15.969759
                SID:2014169
                Source Port:62520
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.857322532014169 11/24/22-19:55:39.901358
                SID:2014169
                Source Port:57322
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249713802024313 11/24/22-19:54:43.021097
                SID:2024313
                Source Port:49713
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249697802024317 11/24/22-19:54:11.348011
                SID:2024317
                Source Port:49697
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497262025483 11/24/22-19:55:09.535230
                SID:2025483
                Source Port:80
                Destination Port:49726
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249707802024318 11/24/22-19:54:31.276699
                SID:2024318
                Source Port:49707
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249746802021641 11/24/22-19:55:49.078874
                SID:2021641
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:95.213.216.202192.168.2.680497012025483 11/24/22-19:54:23.783923
                SID:2025483
                Source Port:80
                Destination Port:49701
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249733802825766 11/24/22-19:55:23.201569
                SID:2825766
                Source Port:49733
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249752802021641 11/24/22-19:56:01.434635
                SID:2021641
                Source Port:49752
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249730802825766 11/24/22-19:55:16.067382
                SID:2825766
                Source Port:49730
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249732802024313 11/24/22-19:55:21.169470
                SID:2024313
                Source Port:49732
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249726802024318 11/24/22-19:55:07.738200
                SID:2024318
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249753802025381 11/24/22-19:56:03.443038
                SID:2025381
                Source Port:49753
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249732802024318 11/24/22-19:55:21.169470
                SID:2024318
                Source Port:49732
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249705802825766 11/24/22-19:54:27.228813
                SID:2825766
                Source Port:49705
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249746802825766 11/24/22-19:55:49.078874
                SID:2825766
                Source Port:49746
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249755802021641 11/24/22-19:56:06.881877
                SID:2021641
                Source Port:49755
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249747802025381 11/24/22-19:55:51.131718
                SID:2025381
                Source Port:49747
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249699802025381 11/24/22-19:54:15.956073
                SID:2025381
                Source Port:49699
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249726802024313 11/24/22-19:55:07.738200
                SID:2024313
                Source Port:49726
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249749802021641 11/24/22-19:55:55.139215
                SID:2021641
                Source Port:49749
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249698802825766 11/24/22-19:54:13.981663
                SID:2825766
                Source Port:49698
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249727802021641 11/24/22-19:55:09.788187
                SID:2021641
                Source Port:49727
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.68.8.8.852715532014169 11/24/22-19:56:06.802187
                SID:2014169
                Source Port:52715
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.852079532014169 11/24/22-19:55:21.075805
                SID:2014169
                Source Port:52079
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.68.8.8.861833532014169 11/24/22-19:55:25.100624
                SID:2014169
                Source Port:61833
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:192.168.2.695.213.216.20249706802025381 11/24/22-19:54:29.062049
                SID:2025381
                Source Port:49706
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249733802021641 11/24/22-19:55:23.201569
                SID:2021641
                Source Port:49733
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249751802024318 11/24/22-19:55:59.376338
                SID:2024318
                Source Port:49751
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249752802825766 11/24/22-19:56:01.434635
                SID:2825766
                Source Port:49752
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249712802025381 11/24/22-19:54:40.926341
                SID:2025381
                Source Port:49712
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:192.168.2.695.213.216.20249711802825766 11/24/22-19:54:38.624655
                SID:2825766
                Source Port:49711
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Payment_copy28476450.exeReversingLabs: Detection: 35%
                Source: Payment_copy28476450.exeVirustotal: Detection: 41%Perma Link
                Source: http://sempersim.su/gl20/fre.phpAvira URL Cloud: Label: malware
                Source: sempersim.suVirustotal: Detection: 25%Perma Link
                Source: http://sempersim.su/gl20/fre.phpVirustotal: Detection: 26%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeReversingLabs: Detection: 50%
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeVirustotal: Detection: 22%Perma Link
                Source: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)ReversingLabs: Detection: 50%
                Source: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Virustotal: Detection: 22%Perma Link
                Source: Payment_copy28476450.exeJoe Sandbox ML: detected
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                Source: Payment_copy28476450.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: wcycejenv.exe, 00000001.00000003.254413056.00000000027C0000.00000004.00001000.00020000.00000000.sdmp, wcycejenv.exe, 00000001.00000003.252943268.0000000002630000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: wcycejenv.exe, 00000001.00000003.254413056.00000000027C0000.00000004.00001000.00020000.00000000.sdmp, wcycejenv.exe, 00000001.00000003.252943268.0000000002630000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00405620 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00405FF6 FindFirstFileA,FindClose,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00402654 FindFirstFileA,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004049D0 lstrcpyW,GetEnvironmentVariableW,lstrcpyW,lstrlenW,lstrcpyW,_wcsrchr,lstrcpyW,GetEnvironmentVariableW,lstrcpyW,lstrcpyW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrlenW,GetFileAttributesW,lstrcatW,FindFirstFileW,FindClose,lstrcpyW,GetFileAttributesW,_wcsrchr,FindExecutableW,SHGetFileInfoW,CreateProcessW,GetLastError,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00405030 lstrcpyW,lstrcatW,lstrcatW,lstrlenW,GetFileAttributesW,lstrcatW,FindFirstFileW,FindClose,GetFileAttributesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00431227 FindFirstFileExW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004315E3 FindFirstFileExW,FindNextFileW,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

                Networking

                barindex
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53731 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49697 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49697 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49697 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49697 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49697 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57686 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49698 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49698 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49698 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49698 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49698 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64382 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49699 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49699 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49699 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49699 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49699 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49699
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53203 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49700 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49700 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49700 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49700 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49700 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49700
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53107 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49701 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49701 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49701 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49701 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49701 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49701
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64601 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49702 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49702 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49702 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49702 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49702 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49702
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49786 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49705 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49705 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49705 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49705 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49705 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49705
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58595 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49706 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49706 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49706 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49706 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49706 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49706
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56331 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49707 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49707 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49707 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49707 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49707 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49707
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50506 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49709 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49709 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49709 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49709 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49709 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49709
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49448 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49710 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49710 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49710 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49710 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49710 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49710
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59082 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49711 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49711 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49711 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49711 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49711 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49711
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59504 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49712 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49712 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49712 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49712 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49712 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49712
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65198 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49713 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49713 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49713 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49713 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49713 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49713
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62910 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49714 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49714 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49714 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49714 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49714 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49714
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63863 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49715 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49715 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49715 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49715 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49715 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49715
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:63229 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49716 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49716 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49716 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49716 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49716 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49716
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:54903 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49718 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49718 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49718 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49718 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49718 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49718
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51530 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49719 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49719 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49719 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49719 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49719 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49719
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56122 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49720 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49720 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49720 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49720 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49720 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49720
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52556 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49721 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49721 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49721 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49721 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49721 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49721
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61609 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49722 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49722 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49722 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49722 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49722 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49722
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52481 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49723 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49723 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49723 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49723 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49723 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49723
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:53943 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49724 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49724 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49724 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49724 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49724 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49724
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56086 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49725 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49725 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49725 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49725 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49725 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49725
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56547 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49726 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49726 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49726 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49726 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49726 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49726
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59881 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49727 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49727 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49727 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49727 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49727 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49727
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:58917 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49728 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49728 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49728 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49728 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49728 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49728
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:50343 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49729 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49729 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49729 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49729 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49729 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49729
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62520 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49730 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49730 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49730 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49730 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49730 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49730
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55629 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49731 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49731 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49731 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49731 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49731 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49731
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52079 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49732 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49732 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49732 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49732 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49732 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49732
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56569 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49733 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49733 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49733 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49733 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49733 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49733
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61833 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49734 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49734 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49734 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49734 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49734 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49734
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:65044 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49735 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49735 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49735 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49735 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49735 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49735
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60032 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49736 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49736 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49736 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49736 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49736 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49736
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:49232 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49737 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49737 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49737 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49737 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49737 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49737
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56123 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49738 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49738 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49738 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49738 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49738 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49738
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59752 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49739 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49739 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49739 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49739 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49739 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49739
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52865 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49740 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49740 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49740 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49740 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49740 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49740
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57322 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49741 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49741 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49741 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49741 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49741 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49741
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62958 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49742 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49742 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49742 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49742 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49742 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49742
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:64404 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49743 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49743 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49743 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49743 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49743 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49743
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62848 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49744 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49744 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49744 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49744 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49744 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49744
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:55956 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49745 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49745 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49745 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49745 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49745 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49745
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:57515 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49746 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49746 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49746 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49746 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49746 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49746
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:51321 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49747 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49747 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49747 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49747 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49747 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49747
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:61089 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49748 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49748 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49748 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49748 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49748 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49748
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62766 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49749 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49749 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49749 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49749 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49749 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49749
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60130 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49750 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49750 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49750 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49750 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49750 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49750
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:62732 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49751 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49751 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49751 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49751 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49751 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49751
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:60690 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49752 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49752 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49752 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49752 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49752 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49752
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:56750 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49753 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49753 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49753 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49753 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49753 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49753
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:59336 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49754 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49754 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49754 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49754 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49754 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49754
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.6:52715 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49755 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49755 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49755 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49755 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49755 -> 95.213.216.202:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.6:49755
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Joe Sandbox ViewASN Name: SELECTELRU SELECTELRU
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 196Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 196Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: global trafficHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 169Connection: close
                Source: Payment_copy28476450.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
                Source: Payment_copy28476450.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: wcycejenv.exe, 00000003.00000002.510211160.00000000004A0000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://sempersim.su/gl20/fre.php
                Source: wcycejenv.exe, wcycejenv.exe, 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, wcycejenv.exe, 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: unknownHTTP traffic detected: POST /gl20/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1131A910Content-Length: 196Connection: close
                Source: unknownDNS traffic detected: queries for: sempersim.su
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00404ED4 recv,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00405125 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

                System Summary

                barindex
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: wcycejenv.exe PID: 5332, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: initial sampleStatic PE information: Filename: Payment_copy28476450.exe
                Source: Payment_copy28476450.exeStatic file information: Suspicious name
                Source: Payment_copy28476450.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                Source: 3.0.wcycejenv.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: wcycejenv.exe PID: 5332, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_0040324F EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00406333
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00404936
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004064B0
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00420069
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004420D3
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004202DD
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00420542
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0043A760
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004027E0
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004207A7
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00420A1B
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0043AC80
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0040CD62
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0043B0B0
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041F0BA
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0040B201
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041F2EC
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00439397
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041F52D
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041F75F
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0043B776
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041F991
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00443AF2
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041FBD2
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00435BDC
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0041FE04
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00441FB3
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_0040549C
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_004029D4
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: String function: 00408200 appears 57 times
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: String function: 00405B6F appears 42 times
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: String function: 0042C7E5 appears 54 times
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: String function: 004338DF appears 33 times
                Source: Payment_copy28476450.exeReversingLabs: Detection: 35%
                Source: Payment_copy28476450.exeVirustotal: Detection: 41%
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeFile read: C:\Users\user\Desktop\Payment_copy28476450.exeJump to behavior
                Source: Payment_copy28476450.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\Payment_copy28476450.exe C:\Users\user\Desktop\Payment_copy28476450.exe
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeProcess created: C:\Users\user\AppData\Local\Temp\wcycejenv.exe "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess created: C:\Users\user\AppData\Local\Temp\wcycejenv.exe "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeProcess created: C:\Users\user\AppData\Local\Temp\wcycejenv.exe "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess created: C:\Users\user\AppData\Local\Temp\wcycejenv.exe "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeFile created: C:\Users\user\AppData\Local\Temp\nsg6B4C.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/7@55/2
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_004043F5 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
                Source: wcycejenv.exe, 00000003.00000003.255548634.0000000002247000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00404110 FormatMessageW,GetLastError,GetLastError,GetStdHandle,LocalFree,
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:584:120:WilError_01
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
                Source: Binary string: wntdll.pdbUGP source: wcycejenv.exe, 00000001.00000003.254413056.00000000027C0000.00000004.00001000.00020000.00000000.sdmp, wcycejenv.exe, 00000001.00000003.252943268.0000000002630000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: wcycejenv.exe, 00000001.00000003.254413056.00000000027C0000.00000004.00001000.00020000.00000000.sdmp, wcycejenv.exe, 00000001.00000003.252943268.0000000002630000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.wcycejenv.exe.610000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wcycejenv.exe PID: 5332, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0042E02E push 59000002h; ret
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00408250 push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00444D5B push ecx; ret
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0042942E push esp; retn 0000h
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00402AC0 push eax; ret
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00402AC0 push eax; ret
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeFile created: C:\Users\user\AppData\Local\Temp\wcycejenv.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile created: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Jump to dropped file
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess information set: NOGPFAULTERRORBOX
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exe TID: 5324Thread sleep time: -660000s >= -30000s
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeAPI coverage: 2.4 %
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00405620 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00405FF6 FindFirstFileA,FindClose,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_00402654 FindFirstFileA,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004049D0 lstrcpyW,GetEnvironmentVariableW,lstrcpyW,lstrlenW,lstrcpyW,_wcsrchr,lstrcpyW,GetEnvironmentVariableW,lstrcpyW,lstrcpyW,lstrcpyW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,lstrcatW,lstrlenW,GetFileAttributesW,lstrcatW,FindFirstFileW,FindClose,lstrcpyW,GetFileAttributesW,_wcsrchr,FindExecutableW,SHGetFileInfoW,CreateProcessW,GetLastError,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00405030 lstrcpyW,lstrcatW,lstrcatW,lstrlenW,GetFileAttributesW,lstrcatW,FindFirstFileW,FindClose,GetFileAttributesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00431227 FindFirstFileExW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004315E3 FindFirstFileExW,FindNextFileW,FindClose,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeThread delayed: delay time: 60000
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00430A14 IsDebuggerPresent,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00436D8B GetProcessHeap,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess token adjusted: Debug
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00428A12 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00428AA0 mov ecx, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433950 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0043390D mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004339EE mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433993 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433AF8 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433AB4 mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433B6D mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00433B3C mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_0040317B mov eax, dword ptr fs:[00000030h]
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0040812D SetUnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004085D0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0042BE3E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_00407F97 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\wcycejenv.exe protection: execute and read and write
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeProcess created: C:\Users\user\AppData\Local\Temp\wcycejenv.exe "C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: EnumSystemLocalesW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: GetLocaleInfoW,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_004083E2 cpuid
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 1_2_0042CCDE GetSystemTimeAsFileTime,
                Source: C:\Users\user\Desktop\Payment_copy28476450.exeCode function: 0_2_0040324F EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: 3_2_00406069 GetUserNameW,

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wcycejenv.exe PID: 5332, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000003.00000002.510358180.0000000000737000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: PopPassword
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeCode function: SmtpPassword
                Source: C:\Users\user\AppData\Local\Temp\wcycejenv.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.wcycejenv.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.wcycejenv.exe.610000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.0.wcycejenv.exe.400000.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath Interception1
                Access Token Manipulation
                1
                Masquerading
                2
                OS Credential Dumping
                1
                System Time Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                System Shutdown/Reboot
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
                Process Injection
                11
                Virtualization/Sandbox Evasion
                2
                Credentials in Registry
                12
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Access Token Manipulation
                Security Account Manager11
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Account Discovery
                Distributed Component Object Model1
                Clipboard Data
                Scheduled Transfer112
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Owner/User Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials1
                Remote System Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync2
                File and Directory Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem26
                System Information Discovery
                Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Payment_copy28476450.exe35%ReversingLabsWin32.Trojan.FormBook
                Payment_copy28476450.exe42%VirustotalBrowse
                Payment_copy28476450.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\wcycejenv.exe50%ReversingLabsWin32.Trojan.FormBook
                C:\Users\user\AppData\Local\Temp\wcycejenv.exe23%VirustotalBrowse
                C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)50%ReversingLabsWin32.Trojan.FormBook
                C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)23%VirustotalBrowse
                SourceDetectionScannerLabelLinkDownload
                3.2.wcycejenv.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.0.Payment_copy28476450.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
                1.2.wcycejenv.exe.610000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                0.2.Payment_copy28476450.exe.400000.0.unpack100%AviraHEUR/AGEN.1223491Download File
                SourceDetectionScannerLabelLink
                sempersim.su25%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://sempersim.su/gl20/fre.php100%Avira URL Cloudmalware
                http://sempersim.su/gl20/fre.php26%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                sempersim.su
                95.213.216.202
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://sempersim.su/gl20/fre.phptrue
                • 26%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorPayment_copy28476450.exefalse
                  high
                  http://nsis.sf.net/NSIS_ErrorErrorPayment_copy28476450.exefalse
                    high
                    http://www.ibsensoftware.com/wcycejenv.exe, wcycejenv.exe, 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, wcycejenv.exe, 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    95.213.216.202
                    sempersim.suRussian Federation
                    49505SELECTELRUtrue
                    IP
                    192.168.2.1
                    Joe Sandbox Version:36.0.0 Rainbow Opal
                    Analysis ID:753423
                    Start date and time:2022-11-24 19:53:07 +01:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 7m 6s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:Payment_copy28476450.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:15
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@6/7@55/2
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 99.6% (good quality ratio 96%)
                    • Quality average: 86.2%
                    • Quality standard deviation: 25%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • HTTP Packets have been reduced
                    • TCP Packets have been reduced to 100
                    • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    19:54:17API Interceptor52x Sleep call for process: wcycejenv.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Users\user\Desktop\Payment_copy28476450.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):459450
                    Entropy (8bit):7.057848521690541
                    Encrypted:false
                    SSDEEP:12288:JxcTxTkKZ9roe9deAwRxFMCgRlXXLRLh7mgb1xuuu9toBdmqQGMZRUuJ5:ATxTkQEweAwbqD7vb1xuuu9Edmdl
                    MD5:DAEA903CE6FBB92BF4BE14AEC7489613
                    SHA1:21872C93628D5B4715A9876332090C3D0EE03E66
                    SHA-256:97CE6EB441A34EBEE7864B4B0E99939D7D773AC7FC416B27F1F72413061944B3
                    SHA-512:9D6B3DAEC38C534A73F91BD26D71D77E3FAD8A21CED7817D9A9CDC5F991503AE348B728D6D9E1257D2D85B9137D33E59D2592EE1E9CABD920BB64FFE8F88D3D5
                    Malicious:false
                    Reputation:low
                    Preview:........,...................N...d...........................................................................................................................................................................................................................................................J...............Y...j...............................................................................................................................l.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\Payment_copy28476450.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):106496
                    Entropy (8bit):7.955523846750811
                    Encrypted:false
                    SSDEEP:3072:wjajJkiH9OPjfkivvicRevZjOqhaMItCzjriqZTa5apaaaaaaaaaaaaaaaaaaaal:Q7fk2evZCqhadZqZ1
                    MD5:B12381A247D8454C152B69D13B35EC05
                    SHA1:347BDD9D8F6E96C6912DC56198BD5038969C41AC
                    SHA-256:1B9C40C7751E34B3A3DD0658B3F1DAC5AA39D85D50D3F02CDAA555220228193E
                    SHA-512:AD79AC16823D14CD07EF1C74C2933B3D1FB15D4C1F22416FCBC0F25E6C087E8C5F3BBD63E393D9B07DCAD185A51D3457F818C56B95CAD074365D8B2CA11D64D8
                    Malicious:false
                    Reputation:low
                    Preview:....{T(...|Y*..<.(ak.5....C..."... .I4......~.......-..xN..z.....B.....3O.....'...U6..0%.]*..9.[QPN.........{..u!...G..........P..WX...{.Z~.Fr.....>Zx.........[6... ?q.e.4..d.k....X.1..F....."u.U..(v.....:l.jy~...Z.h...+...M........d.F...x.]@6jc#.b.c..-T.....Y1y.<...ak.5.....C...".1. .Q4....@~.Z.....-..x..4z.....Be.K.D...N...`c.u..x.v.n....Y..9u.9..xub.{c.s..R................cL.......G.z..w..\1^.....|...g..d.q...5-.....M(:.....M.B....xj.z.....X.p....3....lI..x..QH..U-.....B..x....\>c..b.c...T(...|Y.h.\.V...5..U..C..."6.. ..4......~.......-p{.}N;z.I..Bn.K.B...}M|..Ic....x........{..z.9u...xu....,s..:...............QcL.......G.z..w..\1^.....|...g..d.q...5-.....M(:.....M.B....xj.:.N..X.p....3....lI..x..QH..........F.xD..{.>c#.b.c...T(...|Y1h.<.(ak.5.~...C..."... .I4......~.......-..xN.4z.....B..K.D...N|..Ic....x...n....Y..z.9u.9..xub...,s.R................cL.......G.z..w..\1^.....|...g..d.q...5-.....M(:.....M.B....xj.:.N..X.p....3....lI..x..QH
                    Process:C:\Users\user\Desktop\Payment_copy28476450.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):5655
                    Entropy (8bit):6.234833362351721
                    Encrypted:false
                    SSDEEP:96:4HXF/taUEVYCVmNFHILHl95DTMQUTPENeG2O3VyKbaj9XPlP:w1/tNECRKZTtkG2W8fP
                    MD5:8C23AB33C072F31910D8126FE29420D7
                    SHA1:19752AC35C502F4CD5BB55D3DB4ACE8FD00C0767
                    SHA-256:0C6033793464A7C0D79F2A402CC4DCF821B8C633371B4D676BA18F21FCB3376F
                    SHA-512:612E97ABC1D02F74E9334D2D37A0193C974D6BEFB86E3A578AC2BE71AA6B56331F3F24F69EC9953B525AAD39EFE6376563C8BDAFAA552A936582613BDBCC7099
                    Malicious:false
                    Reputation:low
                    Preview:.*.<<`.,<<<.|..|..<.<.|.K...`.,<<<...|..t....q..~,.=<<..pr.>c.q.;....$...J.<.....q...+<<...2M.....sD.W.M..F.J..q....J.<....`.,<<<.|..|..<.<.|.d.X.....<<<..p.....R..L.T..+..EK;.EK...........p....Zp...y...p..L.:.....=q....J.<.........y.;...8..4t.O..\..._.. .g.|..W...........p...O......c..p.....cq.z.;....EJ.<......l...O..........`.,<<<.|..|..<.<.|.dp.^...q....y..T.....[.q....[c.qR.a.<..[..p.....O......4....JR........\....J.nc2...R......\.LncV.K..Lnc_q..y.....O...y........cT...z.;..;.|...EJ.<.....q...+<<...2M.....~.sD.W.M..F.J..q....J.<....<<O..=<<<.....HN..cN..)N..N..zN..{.aT<.a.<Rv.n...Rp.n...R..n...Rk.n...Ru.n...Rl.n...Rd.n...Rj.n...R6.n...Rz.n..J;.n..@........dn.^..q.........d+>..q.........d.z...q..r......dY....q.."......d|...q.........d..^..q........d.....q..2......dt....q.........;.|S.<N...;.|..<N...;.|M.N...);.|S..N....;.|...N...}..T..H.a.<....|....y..{ ...;ZR......H..........;D.......W;.|S.<.....;E}SE<....c.qn;.|..<.....;E}..<....c.q.;.|M......;E}M.....
                    Process:C:\Users\user\Desktop\Payment_copy28476450.exe
                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):340992
                    Entropy (8bit):6.549726242729774
                    Encrypted:false
                    SSDEEP:6144:Qoe9deNmwPG6xFMCgRlXXLRLh7mzMb1iRWuuu9toDVdmqQL17EMRvM/gRUuJ5dX:Qoe9deAwRxFMCgRlXXLRLh7mgb1xuuuz
                    MD5:3182BEF520A1E9F52BE3755C25E4C3B0
                    SHA1:1829DD90A63BF67DCEB3F6CC41C8AACE8E7E31AD
                    SHA-256:E7ECA366A9467420BA42645AAC451E02D0F009C6F6DFE3A47349510DE0BBFB96
                    SHA-512:BDC8E908D5BCDD52CCF880D11D863D76EE28D9201C51972CD547E94887E32BA986329D5C7615FBB1F01E8E2AF5123E419A411DFAADD8B9B5A2D8E586C947E962
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 50%
                    • Antivirus: Virustotal, Detection: 23%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......i.).-.G.-.G.-.G.v.D.'.G.v.B...G.v.C.?.G...../.G...B...G...C.>.G...D.8.G.v.F.4.G.-.F...G...C.,.G.....,.G...E.,.G.Rich-.G.........PE..L.....~c...............!.x...........z............@..........................P..............................................D........@..............................................................0...@............................................text....v.......x.................. ..`.rdata..............|..............@..@.data........0......................@....rsrc........@.......2..............@..@................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\AppData\Local\Temp\wcycejenv.exe
                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):340992
                    Entropy (8bit):6.549726242729774
                    Encrypted:false
                    SSDEEP:6144:Qoe9deNmwPG6xFMCgRlXXLRLh7mzMb1iRWuuu9toDVdmqQL17EMRvM/gRUuJ5dX:Qoe9deAwRxFMCgRlXXLRLh7mgb1xuuuz
                    MD5:3182BEF520A1E9F52BE3755C25E4C3B0
                    SHA1:1829DD90A63BF67DCEB3F6CC41C8AACE8E7E31AD
                    SHA-256:E7ECA366A9467420BA42645AAC451E02D0F009C6F6DFE3A47349510DE0BBFB96
                    SHA-512:BDC8E908D5BCDD52CCF880D11D863D76EE28D9201C51972CD547E94887E32BA986329D5C7615FBB1F01E8E2AF5123E419A411DFAADD8B9B5A2D8E586C947E962
                    Malicious:true
                    Antivirus:
                    • Antivirus: ReversingLabs, Detection: 50%
                    • Antivirus: Virustotal, Detection: 23%, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......i.).-.G.-.G.-.G.v.D.'.G.v.B...G.v.C.?.G...../.G...B...G...C.>.G...D.8.G.v.F.4.G.-.F...G...C.,.G.....,.G...E.,.G.Rich-.G.........PE..L.....~c...............!.x...........z............@..........................P..............................................D........@..............................................................0...@............................................text....v.......x.................. ..`.rdata..............|..............@..@.data........0......................@....rsrc........@.......2..............@..@................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Users\user\AppData\Local\Temp\wcycejenv.exe
                    File Type:very short file (no magic)
                    Category:dropped
                    Size (bytes):1
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3:U:U
                    MD5:C4CA4238A0B923820DCC509A6F75849B
                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview:1
                    Process:C:\Users\user\AppData\Local\Temp\wcycejenv.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):49
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:884BB48A55DA67B4812805CB8905277D
                    SHA1:6B3D33E00F5B9DEAE2826F80644CB4F6E78B7401
                    SHA-256:78877FA898F0B4C45C9C33AE941E40617AD7C8657A307DB62BC5691F92F4F60E
                    SHA-512:989A38778FC961EB2C79E70621EABFB4B22D6537F08A71359B27AF495646E304EE252A523769F66B75BC2FAF546ACB22A71B358B51221174AC0D964DA7A62821
                    Malicious:false
                    Preview:.................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                    Entropy (8bit):7.918853891717431
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:Payment_copy28476450.exe
                    File size:247655
                    MD5:70e90926399154c2708801a73cf53d99
                    SHA1:0eaff8f1cde17a392d9e7935bae96f21c91acc3c
                    SHA256:c36de6d07a8ce4407cb59a275dbf8c04d05844903bb6d566f295ccd13a2d4ce6
                    SHA512:a6256e11df089a3063738ca0e36eca4ca89ed89ac7530a83394aa1864ba392e87318270529d04b1c72fa0d2cb392ba8c66ebedca335af82ec8fe124814ec9cab
                    SSDEEP:6144:QBn1WN747c5LFA0rw3gw8QXRq+/lp7q76lS:gWZ4wa8QXRq+/Pe76lS
                    TLSH:F434126B32F09476F961057099B3A657EBFA9300455813474BC7CFBBADB06C2CE8A172
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........3(..RF..RF..RF.*]...RF..RG.pRF.*]...RF..qv..RF..T@..RF.Rich.RF.........................PE..L...ly.V.................^.........
                    Icon Hash:b2a88c96b2ca6a72
                    Entrypoint:0x40324f
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:TERMINAL_SERVER_AWARE
                    Time Stamp:0x567F796C [Sun Dec 27 05:38:52 2015 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:ab6770b0a8635b9d92a5838920cfe770
                    Instruction
                    sub esp, 00000180h
                    push ebx
                    push ebp
                    push esi
                    push edi
                    xor ebx, ebx
                    push 00008001h
                    mov dword ptr [esp+1Ch], ebx
                    mov dword ptr [esp+14h], 00409130h
                    xor esi, esi
                    mov byte ptr [esp+18h], 00000020h
                    call dword ptr [004070B8h]
                    call dword ptr [004070B4h]
                    cmp ax, 00000006h
                    je 00007FDE449C9A73h
                    push ebx
                    call 00007FDE449CC861h
                    cmp eax, ebx
                    je 00007FDE449C9A69h
                    push 00000C00h
                    call eax
                    push 004091E0h
                    call 00007FDE449CC7E2h
                    push 004091D8h
                    call 00007FDE449CC7D8h
                    push 004091CCh
                    call 00007FDE449CC7CEh
                    push 0000000Dh
                    call 00007FDE449CC831h
                    push 0000000Bh
                    call 00007FDE449CC82Ah
                    mov dword ptr [00423F84h], eax
                    call dword ptr [00407034h]
                    push ebx
                    call dword ptr [00407270h]
                    mov dword ptr [00424038h], eax
                    push ebx
                    lea eax, dword ptr [esp+34h]
                    push 00000160h
                    push eax
                    push ebx
                    push 0041F538h
                    call dword ptr [00407160h]
                    push 004091C0h
                    push 00423780h
                    call 00007FDE449CC461h
                    call dword ptr [004070B0h]
                    mov ebp, 0042A000h
                    push eax
                    push ebp
                    call 00007FDE449CC44Fh
                    push ebx
                    call dword ptr [00407144h]
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x73cc0xa0.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x9e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x280.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x5c4a0x5e00False0.659906914893617data6.410763775060762IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x70000x115e0x1200False0.4466145833333333data5.142548180775325IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x90000x1b0780x600False0.455078125data4.2252195571372315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .ndata0x250000x80000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x2d0000x9e00xa00False0.45625data4.509328731926377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x2d1900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States
                    RT_DIALOG0x2d4780x100dataEnglishUnited States
                    RT_DIALOG0x2d5780x11cdataEnglishUnited States
                    RT_DIALOG0x2d6980x60dataEnglishUnited States
                    RT_GROUP_ICON0x2d6f80x14dataEnglishUnited States
                    RT_MANIFEST0x2d7100x2ccXML 1.0 document, ASCII text, with very long lines (716), with no line terminatorsEnglishUnited States
                    DLLImport
                    KERNEL32.dllSetFileAttributesA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CompareFileTime, SearchPathA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, CreateDirectoryA, lstrcmpiA, GetTempPathA, GetCommandLineA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, LoadLibraryA, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, WaitForSingleObject, ExitProcess, GetWindowsDirectoryA, GetProcAddress, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, WriteFile, MulDiv, LoadLibraryExA, GetModuleHandleA, MultiByteToWideChar, FreeLibrary
                    USER32.dllGetWindowRect, EnableMenuItem, GetSystemMenu, ScreenToClient, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetForegroundWindow, PostQuitMessage, RegisterClassA, EndDialog, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, OpenClipboard, TrackPopupMenu, SendMessageTimeoutA, GetDC, LoadImageA, GetDlgItem, FindWindowExA, IsWindow, SetClipboardData, SetWindowLongA, EmptyClipboard, SetTimer, CreateDialogParamA, wsprintfA, ShowWindow, SetWindowTextA
                    GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                    SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                    ADVAPI32.dllRegDeleteValueA, SetFileSecurityA, RegOpenKeyExA, RegDeleteKeyA, RegEnumValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                    ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    192.168.2.695.213.216.20249737802025381 11/24/22-19:55:31.199874TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249748802021641 11/24/22-19:55:53.130311TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249750802825766 11/24/22-19:55:57.329298TCP2825766ETPRO TROJAN LokiBot Checkin M24975080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249751802021641 11/24/22-19:55:59.376338TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975180192.168.2.695.213.216.202
                    192.168.2.68.8.8.859881532014169 11/24/22-19:55:09.708351UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5988153192.168.2.68.8.8.8
                    95.213.216.202192.168.2.680497332025483 11/24/22-19:55:24.906100TCP2025483ET TROJAN LokiBot Fake 404 Response804973395.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497352025483 11/24/22-19:55:28.867256TCP2025483ET TROJAN LokiBot Fake 404 Response804973595.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249736802024318 11/24/22-19:55:29.163584TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973680192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497372025483 11/24/22-19:55:32.908191TCP2025483ET TROJAN LokiBot Fake 404 Response804973795.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497392025483 11/24/22-19:55:36.924861TCP2025483ET TROJAN LokiBot Fake 404 Response804973995.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249754802024318 11/24/22-19:56:04.818902TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249736802024313 11/24/22-19:55:29.163584TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973680192.168.2.695.213.216.202
                    192.168.2.68.8.8.856122532014169 11/24/22-19:54:54.866804UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249754802024313 11/24/22-19:56:04.818902TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249711802024313 11/24/22-19:54:38.624655TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249705802021641 11/24/22-19:54:27.228813TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249719802025381 11/24/22-19:54:53.033944TCP2025381ET TROJAN LokiBot Checkin4971980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249729802825766 11/24/22-19:55:13.852615TCP2825766ETPRO TROJAN LokiBot Checkin M24972980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249722802025381 11/24/22-19:54:59.769485TCP2025381ET TROJAN LokiBot Checkin4972280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249747802825766 11/24/22-19:55:51.131718TCP2825766ETPRO TROJAN LokiBot Checkin M24974780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249711802024318 11/24/22-19:54:38.624655TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249740802025381 11/24/22-19:55:37.776321TCP2025381ET TROJAN LokiBot Checkin4974080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249750802025381 11/24/22-19:55:57.329298TCP2025381ET TROJAN LokiBot Checkin4975080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249737802825766 11/24/22-19:55:31.199874TCP2825766ETPRO TROJAN LokiBot Checkin M24973780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249714802825766 11/24/22-19:54:45.091814TCP2825766ETPRO TROJAN LokiBot Checkin M24971480192.168.2.695.213.216.202
                    192.168.2.68.8.8.850343532014169 11/24/22-19:55:13.761219UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5034353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249741802021641 11/24/22-19:55:39.990050TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249709802025381 11/24/22-19:54:33.518227TCP2025381ET TROJAN LokiBot Checkin4970980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249723802021641 11/24/22-19:55:01.692450TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249727802025381 11/24/22-19:55:09.788187TCP2025381ET TROJAN LokiBot Checkin4972780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249700802021641 11/24/22-19:54:18.249997TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970080192.168.2.695.213.216.202
                    192.168.2.68.8.8.856569532014169 11/24/22-19:55:23.105213UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5656953192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249719802825766 11/24/22-19:54:53.033944TCP2825766ETPRO TROJAN LokiBot Checkin M24971980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249732802825766 11/24/22-19:55:21.169470TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.695.213.216.202
                    192.168.2.68.8.8.853943532014169 11/24/22-19:55:03.645658UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5394353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249755802025381 11/24/22-19:56:06.881877TCP2025381ET TROJAN LokiBot Checkin4975580192.168.2.695.213.216.202
                    192.168.2.68.8.8.855629532014169 11/24/22-19:55:19.049102UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5562953192.168.2.68.8.8.8
                    95.213.216.202192.168.2.680497312025483 11/24/22-19:55:20.867899TCP2025483ET TROJAN LokiBot Fake 404 Response804973195.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249755802825766 11/24/22-19:56:06.881877TCP2825766ETPRO TROJAN LokiBot Checkin M24975580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249701802024313 11/24/22-19:54:22.087876TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249732802025381 11/24/22-19:55:21.169470TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.695.213.216.202
                    192.168.2.68.8.8.860130532014169 11/24/22-19:55:57.225226UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6013053192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249718802024313 11/24/22-19:54:50.807735TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249701802024318 11/24/22-19:54:22.087876TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249699802024318 11/24/22-19:54:15.956073TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24969980192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497402025483 11/24/22-19:55:39.709470TCP2025483ET TROJAN LokiBot Fake 404 Response804974095.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497422025483 11/24/22-19:55:42.590814TCP2025483ET TROJAN LokiBot Fake 404 Response804974295.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249718802024318 11/24/22-19:54:50.807735TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249699802024313 11/24/22-19:54:15.956073TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14969980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249702802025381 11/24/22-19:54:25.054966TCP2025381ET TROJAN LokiBot Checkin4970280192.168.2.695.213.216.202
                    192.168.2.68.8.8.861609532014169 11/24/22-19:54:59.613442UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6160953192.168.2.68.8.8.8
                    95.213.216.202192.168.2.680497282025483 11/24/22-19:55:13.560423TCP2025483ET TROJAN LokiBot Fake 404 Response804972895.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249710802021641 11/24/22-19:54:35.914327TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249716802024318 11/24/22-19:54:48.704817TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971680192.168.2.695.213.216.202
                    192.168.2.68.8.8.862958532014169 11/24/22-19:55:40.875534UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6295853192.168.2.68.8.8.8
                    192.168.2.68.8.8.864382532014169 11/24/22-19:54:15.835585UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6438253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249716802024313 11/24/22-19:54:48.704817TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249707802021641 11/24/22-19:54:31.276699TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249739802825766 11/24/22-19:55:35.259290TCP2825766ETPRO TROJAN LokiBot Checkin M24973980192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497242025483 11/24/22-19:55:05.403255TCP2025483ET TROJAN LokiBot Fake 404 Response804972495.213.216.202192.168.2.6
                    192.168.2.68.8.8.849232532014169 11/24/22-19:55:31.114753UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4923253192.168.2.68.8.8.8
                    192.168.2.68.8.8.862848532014169 11/24/22-19:55:44.925533UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6284853192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249713802021641 11/24/22-19:54:43.021097TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249745802825766 11/24/22-19:55:47.082758TCP2825766ETPRO TROJAN LokiBot Checkin M24974580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249731802024318 11/24/22-19:55:19.158567TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249706802825766 11/24/22-19:54:29.062049TCP2825766ETPRO TROJAN LokiBot Checkin M24970680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249749802024313 11/24/22-19:55:55.139215TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249709802825766 11/24/22-19:54:33.518227TCP2825766ETPRO TROJAN LokiBot Checkin M24970980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249731802024313 11/24/22-19:55:19.158567TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249746802024313 11/24/22-19:55:49.078874TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249742802825766 11/24/22-19:55:40.973542TCP2825766ETPRO TROJAN LokiBot Checkin M24974280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249749802024318 11/24/22-19:55:55.139215TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974980192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497072025483 11/24/22-19:54:33.040572TCP2025483ET TROJAN LokiBot Fake 404 Response804970795.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249712802825766 11/24/22-19:54:40.926341TCP2825766ETPRO TROJAN LokiBot Checkin M24971280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249752802024313 11/24/22-19:56:01.434635TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249746802024318 11/24/22-19:55:49.078874TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249752802024318 11/24/22-19:56:01.434635TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249728802021641 11/24/22-19:55:11.780324TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249743802021641 11/24/22-19:55:42.875605TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249738802024313 11/24/22-19:55:33.192742TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973880192.168.2.695.213.216.202
                    192.168.2.68.8.8.862910532014169 11/24/22-19:54:44.985895UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6291053192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249724802025381 11/24/22-19:55:03.741584TCP2025381ET TROJAN LokiBot Checkin4972480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249738802024318 11/24/22-19:55:33.192742TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249740802825766 11/24/22-19:55:37.776321TCP2825766ETPRO TROJAN LokiBot Checkin M24974080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249744802024313 11/24/22-19:55:45.028740TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249697802825766 11/24/22-19:54:11.348011TCP2825766ETPRO TROJAN LokiBot Checkin M24969780192.168.2.695.213.216.202
                    192.168.2.68.8.8.856331532014169 11/24/22-19:54:31.195563UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5633153192.168.2.68.8.8.8
                    192.168.2.68.8.8.849448532014169 11/24/22-19:54:35.800639UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4944853192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249744802024318 11/24/22-19:55:45.028740TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.695.213.216.202
                    192.168.2.68.8.8.856750532014169 11/24/22-19:56:03.361289UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5675053192.168.2.68.8.8.8
                    192.168.2.68.8.8.850506532014169 11/24/22-19:54:33.429766UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5050653192.168.2.68.8.8.8
                    192.168.2.68.8.8.859752532014169 11/24/22-19:55:35.135406UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5975253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249721802021641 11/24/22-19:54:56.896268TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249729802025381 11/24/22-19:55:13.852615TCP2025381ET TROJAN LokiBot Checkin4972980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249698802025381 11/24/22-19:54:13.981663TCP2025381ET TROJAN LokiBot Checkin4969880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249730802025381 11/24/22-19:55:16.067382TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.695.213.216.202
                    192.168.2.68.8.8.862732532014169 11/24/22-19:55:59.286288UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6273253192.168.2.68.8.8.8
                    192.168.2.68.8.8.859336532014169 11/24/22-19:56:04.733170UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5933653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249734802825766 11/24/22-19:55:25.189583TCP2825766ETPRO TROJAN LokiBot Checkin M24973480192.168.2.695.213.216.202
                    192.168.2.68.8.8.865198532014169 11/24/22-19:54:42.928676UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6519853192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249735802025381 11/24/22-19:55:27.170416TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497542025483 11/24/22-19:56:06.628427TCP2025483ET TROJAN LokiBot Fake 404 Response804975495.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249715802021641 11/24/22-19:54:47.405096TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971580192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497192025483 11/24/22-19:54:54.654090TCP2025483ET TROJAN LokiBot Fake 404 Response804971995.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497522025483 11/24/22-19:56:03.175717TCP2025483ET TROJAN LokiBot Fake 404 Response804975295.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249753802825766 11/24/22-19:56:03.443038TCP2825766ETPRO TROJAN LokiBot Checkin M24975380192.168.2.695.213.216.202
                    192.168.2.68.8.8.851321532014169 11/24/22-19:55:51.025349UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5132153192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249697802025381 11/24/22-19:54:11.348011TCP2025381ET TROJAN LokiBot Checkin4969780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249707802825766 11/24/22-19:54:31.276699TCP2825766ETPRO TROJAN LokiBot Checkin M24970780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249744802825766 11/24/22-19:55:45.028740TCP2825766ETPRO TROJAN LokiBot Checkin M24974480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249749802025381 11/24/22-19:55:55.139215TCP2025381ET TROJAN LokiBot Checkin4974980192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497162025483 11/24/22-19:54:50.512832TCP2025483ET TROJAN LokiBot Fake 404 Response804971695.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497142025483 11/24/22-19:54:46.656019TCP2025483ET TROJAN LokiBot Fake 404 Response804971495.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249754802021641 11/24/22-19:56:04.818902TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249705802024318 11/24/22-19:54:27.228813TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249710802025381 11/24/22-19:54:35.914327TCP2025381ET TROJAN LokiBot Checkin4971080192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497112025483 11/24/22-19:54:39.580169TCP2025483ET TROJAN LokiBot Fake 404 Response804971195.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497132025483 11/24/22-19:54:44.610304TCP2025483ET TROJAN LokiBot Fake 404 Response804971395.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249735802825766 11/24/22-19:55:27.170416TCP2825766ETPRO TROJAN LokiBot Checkin M24973580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249752802025381 11/24/22-19:56:01.434635TCP2025381ET TROJAN LokiBot Checkin4975280192.168.2.695.213.216.202
                    192.168.2.68.8.8.862766532014169 11/24/22-19:55:55.046216UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6276653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249705802024313 11/24/22-19:54:27.228813TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249710802825766 11/24/22-19:54:35.914327TCP2825766ETPRO TROJAN LokiBot Checkin M24971080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249707802025381 11/24/22-19:54:31.276699TCP2025381ET TROJAN LokiBot Checkin4970780192.168.2.695.213.216.202
                    192.168.2.68.8.8.864601532014169 11/24/22-19:54:24.912578UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6460153192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249706802024313 11/24/22-19:54:29.062049TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249735802021641 11/24/22-19:55:27.170416TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249706802024318 11/24/22-19:54:29.062049TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970680192.168.2.695.213.216.202
                    192.168.2.68.8.8.852481532014169 11/24/22-19:55:01.607307UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5248153192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249726802825766 11/24/22-19:55:07.738200TCP2825766ETPRO TROJAN LokiBot Checkin M24972680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249754802825766 11/24/22-19:56:04.818902TCP2825766ETPRO TROJAN LokiBot Checkin M24975480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249733802025381 11/24/22-19:55:23.201569TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249753802021641 11/24/22-19:56:03.443038TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249724802024313 11/24/22-19:55:03.741584TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972480192.168.2.695.213.216.202
                    192.168.2.68.8.8.864404532014169 11/24/22-19:55:42.774058UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6440453192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249726802025381 11/24/22-19:55:07.738200TCP2025381ET TROJAN LokiBot Checkin4972680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249747802024318 11/24/22-19:55:51.131718TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249725802825766 11/24/22-19:55:05.694279TCP2825766ETPRO TROJAN LokiBot Checkin M24972580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249712802021641 11/24/22-19:54:40.926341TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249747802024313 11/24/22-19:55:51.131718TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974780192.168.2.695.213.216.202
                    192.168.2.68.8.8.852865532014169 11/24/22-19:55:37.629169UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5286553192.168.2.68.8.8.8
                    95.213.216.202192.168.2.680497462025483 11/24/22-19:55:50.859980TCP2025483ET TROJAN LokiBot Fake 404 Response804974695.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249699802021641 11/24/22-19:54:15.956073TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249724802024318 11/24/22-19:55:03.741584TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972480192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497552025483 11/24/22-19:56:08.689068TCP2025483ET TROJAN LokiBot Fake 404 Response804975595.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249719802021641 11/24/22-19:54:53.033944TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971980192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497442025483 11/24/22-19:55:46.796463TCP2025483ET TROJAN LokiBot Fake 404 Response804974495.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497272025483 11/24/22-19:55:11.470809TCP2025483ET TROJAN LokiBot Fake 404 Response804972795.213.216.202192.168.2.6
                    192.168.2.68.8.8.863863532014169 11/24/22-19:54:46.995919UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6386353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249716802021641 11/24/22-19:54:48.704817TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249751802025381 11/24/22-19:55:59.376338TCP2025381ET TROJAN LokiBot Checkin4975180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249714802025381 11/24/22-19:54:45.091814TCP2025381ET TROJAN LokiBot Checkin4971480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249722802021641 11/24/22-19:54:59.769485TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497222025483 11/24/22-19:55:01.407205TCP2025483ET TROJAN LokiBot Fake 404 Response804972295.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249720802025381 11/24/22-19:54:54.960633TCP2025381ET TROJAN LokiBot Checkin4972080192.168.2.695.213.216.202
                    192.168.2.68.8.8.853203532014169 11/24/22-19:54:18.123294UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5320353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249700802825766 11/24/22-19:54:18.249997TCP2825766ETPRO TROJAN LokiBot Checkin M24970080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249737802024318 11/24/22-19:55:31.199874TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249740802024313 11/24/22-19:55:37.776321TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249742802025381 11/24/22-19:55:40.973542TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497052025483 11/24/22-19:54:28.634655TCP2025483ET TROJAN LokiBot Fake 404 Response804970595.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249731802021641 11/24/22-19:55:19.158567TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.695.213.216.202
                    192.168.2.68.8.8.857686532014169 11/24/22-19:54:13.553924UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5768653192.168.2.68.8.8.8
                    192.168.2.68.8.8.858595532014169 11/24/22-19:54:28.961973UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5859553192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249736802025381 11/24/22-19:55:29.163584TCP2025381ET TROJAN LokiBot Checkin4973680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249745802025381 11/24/22-19:55:47.082758TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.695.213.216.202
                    192.168.2.68.8.8.857515532014169 11/24/22-19:55:48.986225UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5751553192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249734802024318 11/24/22-19:55:25.189583TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973480192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497002025483 11/24/22-19:54:20.029122TCP2025483ET TROJAN LokiBot Fake 404 Response804970095.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249725802021641 11/24/22-19:55:05.694279TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249734802024313 11/24/22-19:55:25.189583TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249743802024318 11/24/22-19:55:42.875605TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249728802024318 11/24/22-19:55:11.780324TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249737802024313 11/24/22-19:55:31.199874TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249728802024313 11/24/22-19:55:11.780324TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249739802025381 11/24/22-19:55:35.259290TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.695.213.216.202
                    192.168.2.68.8.8.855956532014169 11/24/22-19:55:46.990731UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5595653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249743802024313 11/24/22-19:55:42.875605TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249709802024313 11/24/22-19:54:33.518227TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249738802021641 11/24/22-19:55:33.192742TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973880192.168.2.695.213.216.202
                    192.168.2.68.8.8.859082532014169 11/24/22-19:54:38.013432UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5908253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249740802024318 11/24/22-19:55:37.776321TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249722802825766 11/24/22-19:54:59.769485TCP2825766ETPRO TROJAN LokiBot Checkin M24972280192.168.2.695.213.216.202
                    192.168.2.68.8.8.851530532014169 11/24/22-19:54:52.685795UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5153053192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249701802025381 11/24/22-19:54:22.087876TCP2025381ET TROJAN LokiBot Checkin4970180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249723802025381 11/24/22-19:55:01.692450TCP2025381ET TROJAN LokiBot Checkin4972380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249721802024313 11/24/22-19:54:56.896268TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249750802021641 11/24/22-19:55:57.329298TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249715802024318 11/24/22-19:54:47.405096TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971580192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497302025483 11/24/22-19:55:17.735946TCP2025483ET TROJAN LokiBot Fake 404 Response804973095.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249716802825766 11/24/22-19:54:48.704817TCP2825766ETPRO TROJAN LokiBot Checkin M24971680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249721802024318 11/24/22-19:54:56.896268TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972180192.168.2.695.213.216.202
                    192.168.2.68.8.8.860032532014169 11/24/22-19:55:29.068969UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6003253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249744802021641 11/24/22-19:55:45.028740TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497412025483 11/24/22-19:55:40.700457TCP2025483ET TROJAN LokiBot Fake 404 Response804974195.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497492025483 11/24/22-19:55:57.050677TCP2025483ET TROJAN LokiBot Fake 404 Response804974995.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249709802024318 11/24/22-19:54:33.518227TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249715802024313 11/24/22-19:54:47.405096TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971580192.168.2.695.213.216.202
                    192.168.2.68.8.8.858917532014169 11/24/22-19:55:11.700175UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5891753192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249745802024318 11/24/22-19:55:47.082758TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497342025483 11/24/22-19:55:26.886961TCP2025483ET TROJAN LokiBot Fake 404 Response804973495.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249742802021641 11/24/22-19:55:40.973542TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497362025483 11/24/22-19:55:30.902353TCP2025483ET TROJAN LokiBot Fake 404 Response804973695.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497382025483 11/24/22-19:55:34.897313TCP2025483ET TROJAN LokiBot Fake 404 Response804973895.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497322025483 11/24/22-19:55:22.836179TCP2025483ET TROJAN LokiBot Fake 404 Response804973295.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249739802021641 11/24/22-19:55:35.259290TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249741802825766 11/24/22-19:55:39.990050TCP2825766ETPRO TROJAN LokiBot Checkin M24974180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249728802025381 11/24/22-19:55:11.780324TCP2025381ET TROJAN LokiBot Checkin4972880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249745802024313 11/24/22-19:55:47.082758TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249713802825766 11/24/22-19:54:43.021097TCP2825766ETPRO TROJAN LokiBot Checkin M24971380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249746802025381 11/24/22-19:55:49.078874TCP2025381ET TROJAN LokiBot Checkin4974680192.168.2.695.213.216.202
                    192.168.2.68.8.8.853731532014169 11/24/22-19:54:11.254500UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5373153192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249702802024318 11/24/22-19:54:25.054966TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249713802025381 11/24/22-19:54:43.021097TCP2025381ET TROJAN LokiBot Checkin4971380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249738802825766 11/24/22-19:55:33.192742TCP2825766ETPRO TROJAN LokiBot Checkin M24973880192.168.2.695.213.216.202
                    192.168.2.68.8.8.861089532014169 11/24/22-19:55:53.045222UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6108953192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249714802021641 11/24/22-19:54:45.091814TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249720802024313 11/24/22-19:54:54.960633TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249702802024313 11/24/22-19:54:25.054966TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249720802024318 11/24/22-19:54:54.960633TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249731802025381 11/24/22-19:55:19.158567TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249735802024313 11/24/22-19:55:27.170416TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249698802024317 11/24/22-19:54:13.981663TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249698802024312 11/24/22-19:54:13.981663TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249729802021641 11/24/22-19:55:13.852615TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249721802025381 11/24/22-19:54:56.896268TCP2025381ET TROJAN LokiBot Checkin4972180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249731802825766 11/24/22-19:55:19.158567TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249712802024313 11/24/22-19:54:40.926341TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249712802024318 11/24/22-19:54:40.926341TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249735802024318 11/24/22-19:55:27.170416TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249724802021641 11/24/22-19:55:03.741584TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249748802825766 11/24/22-19:55:53.130311TCP2825766ETPRO TROJAN LokiBot Checkin M24974880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249753802024318 11/24/22-19:56:03.443038TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249753802024313 11/24/22-19:56:03.443038TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249730802024318 11/24/22-19:55:16.067382TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249747802021641 11/24/22-19:55:51.131718TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249738802025381 11/24/22-19:55:33.192742TCP2025381ET TROJAN LokiBot Checkin4973880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249730802024313 11/24/22-19:55:16.067382TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249706802021641 11/24/22-19:54:29.062049TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249705802025381 11/24/22-19:54:27.228813TCP2025381ET TROJAN LokiBot Checkin4970580192.168.2.695.213.216.202
                    192.168.2.68.8.8.863229532014169 11/24/22-19:54:48.619009UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6322953192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249721802825766 11/24/22-19:54:56.896268TCP2825766ETPRO TROJAN LokiBot Checkin M24972180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249722802024313 11/24/22-19:54:59.769485TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497432025483 11/24/22-19:55:44.744520TCP2025483ET TROJAN LokiBot Fake 404 Response804974395.213.216.202192.168.2.6
                    192.168.2.68.8.8.849786532014169 11/24/22-19:54:27.135932UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4978653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249725802024313 11/24/22-19:55:05.694279TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249719802024318 11/24/22-19:54:53.033944TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249722802024318 11/24/22-19:54:59.769485TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249725802024318 11/24/22-19:55:05.694279TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972580192.168.2.695.213.216.202
                    192.168.2.68.8.8.856123532014169 11/24/22-19:55:33.111651UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5612353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249697802021641 11/24/22-19:54:11.348011TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249711802025381 11/24/22-19:54:38.624655TCP2025381ET TROJAN LokiBot Checkin4971180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249736802825766 11/24/22-19:55:29.163584TCP2825766ETPRO TROJAN LokiBot Checkin M24973680192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497292025483 11/24/22-19:55:15.362841TCP2025483ET TROJAN LokiBot Fake 404 Response804972995.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497252025483 11/24/22-19:55:07.447890TCP2025483ET TROJAN LokiBot Fake 404 Response804972595.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497212025483 11/24/22-19:54:58.247548TCP2025483ET TROJAN LokiBot Fake 404 Response804972195.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249750802024318 11/24/22-19:55:57.329298TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249737802021641 11/24/22-19:55:31.199874TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249751802825766 11/24/22-19:55:59.376338TCP2825766ETPRO TROJAN LokiBot Checkin M24975180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249740802021641 11/24/22-19:55:37.776321TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974080192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497022025483 11/24/22-19:54:26.773719TCP2025483ET TROJAN LokiBot Fake 404 Response804970295.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497062025483 11/24/22-19:54:30.867234TCP2025483ET TROJAN LokiBot Fake 404 Response804970695.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249754802025381 11/24/22-19:56:04.818902TCP2025381ET TROJAN LokiBot Checkin4975480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249699802825766 11/24/22-19:54:15.956073TCP2825766ETPRO TROJAN LokiBot Checkin M24969980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249719802024313 11/24/22-19:54:53.033944TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249734802021641 11/24/22-19:55:25.189583TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249748802025381 11/24/22-19:55:53.130311TCP2025381ET TROJAN LokiBot Checkin4974880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249715802825766 11/24/22-19:54:47.405096TCP2825766ETPRO TROJAN LokiBot Checkin M24971580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249732802021641 11/24/22-19:55:21.169470TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249709802021641 11/24/22-19:54:33.518227TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249755802024318 11/24/22-19:56:06.881877TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249741802025381 11/24/22-19:55:39.990050TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249755802024313 11/24/22-19:56:06.881877TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249723802825766 11/24/22-19:55:01.692450TCP2825766ETPRO TROJAN LokiBot Checkin M24972380192.168.2.695.213.216.202
                    192.168.2.68.8.8.865044532014169 11/24/22-19:55:27.077654UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6504453192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249726802021641 11/24/22-19:55:07.738200TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249718802025381 11/24/22-19:54:50.807735TCP2025381ET TROJAN LokiBot Checkin4971880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249727802024313 11/24/22-19:55:09.788187TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249750802024313 11/24/22-19:55:57.329298TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249727802024318 11/24/22-19:55:09.788187TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249700802025381 11/24/22-19:54:18.249997TCP2025381ET TROJAN LokiBot Checkin4970080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249733802024313 11/24/22-19:55:23.201569TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497472025483 11/24/22-19:55:52.860690TCP2025483ET TROJAN LokiBot Fake 404 Response804974795.213.216.202192.168.2.6
                    192.168.2.68.8.8.856086532014169 11/24/22-19:55:05.605111UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5608653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249728802825766 11/24/22-19:55:11.780324TCP2825766ETPRO TROJAN LokiBot Checkin M24972880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249733802024318 11/24/22-19:55:23.201569TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497502025483 11/24/22-19:55:59.104900TCP2025483ET TROJAN LokiBot Fake 404 Response804975095.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249734802025381 11/24/22-19:55:25.189583TCP2025381ET TROJAN LokiBot Checkin4973480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249742802024318 11/24/22-19:55:40.973542TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497532025483 11/24/22-19:56:04.545301TCP2025483ET TROJAN LokiBot Fake 404 Response804975395.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497182025483 11/24/22-19:54:52.477982TCP2025483ET TROJAN LokiBot Fake 404 Response804971895.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249751802024313 11/24/22-19:55:59.376338TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975180192.168.2.695.213.216.202
                    192.168.2.68.8.8.860690532014169 11/24/22-19:56:01.353337UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6069053192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249748802024313 11/24/22-19:55:53.130311TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249701802825766 11/24/22-19:54:22.087876TCP2825766ETPRO TROJAN LokiBot Checkin M24970180192.168.2.695.213.216.202
                    192.168.2.68.8.8.854903532014169 11/24/22-19:54:50.721248UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5490353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249743802025381 11/24/22-19:55:42.875605TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249742802024313 11/24/22-19:55:40.973542TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974280192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497152025483 11/24/22-19:54:48.216785TCP2025483ET TROJAN LokiBot Fake 404 Response804971595.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249736802021641 11/24/22-19:55:29.163584TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249739802024313 11/24/22-19:55:35.259290TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249739802024318 11/24/22-19:55:35.259290TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249745802021641 11/24/22-19:55:47.082758TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249748802024318 11/24/22-19:55:53.130311TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974880192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680496992025483 11/24/22-19:54:17.569674TCP2025483ET TROJAN LokiBot Fake 404 Response804969995.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497102025483 11/24/22-19:54:37.501776TCP2025483ET TROJAN LokiBot Fake 404 Response804971095.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497122025483 11/24/22-19:54:42.610242TCP2025483ET TROJAN LokiBot Fake 404 Response804971295.213.216.202192.168.2.6
                    192.168.2.68.8.8.856547532014169 11/24/22-19:55:07.655761UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5654753192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249714802024313 11/24/22-19:54:45.091814TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249720802021641 11/24/22-19:54:54.960633TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249714802024318 11/24/22-19:54:45.091814TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249725802025381 11/24/22-19:55:05.694279TCP2025381ET TROJAN LokiBot Checkin4972580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249702802021641 11/24/22-19:54:25.054966TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249711802021641 11/24/22-19:54:38.624655TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971180192.168.2.695.213.216.202
                    192.168.2.68.8.8.859504532014169 11/24/22-19:54:40.838615UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5950453192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249716802025381 11/24/22-19:54:48.704817TCP2025381ET TROJAN LokiBot Checkin4971680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249698802021641 11/24/22-19:54:13.981663TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249729802024318 11/24/22-19:55:13.852615TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249700802024318 11/24/22-19:54:18.249997TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249715802025381 11/24/22-19:54:47.405096TCP2025381ET TROJAN LokiBot Checkin4971580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249723802024318 11/24/22-19:55:01.692450TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249729802024313 11/24/22-19:55:13.852615TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249723802024313 11/24/22-19:55:01.692450TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972380192.168.2.695.213.216.202
                    192.168.2.68.8.8.852556532014169 11/24/22-19:54:56.722023UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5255653192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249741802024318 11/24/22-19:55:39.990050TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249749802825766 11/24/22-19:55:55.139215TCP2825766ETPRO TROJAN LokiBot Checkin M24974980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249741802024313 11/24/22-19:55:39.990050TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249700802024313 11/24/22-19:54:18.249997TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970080192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497202025483 11/24/22-19:54:56.488535TCP2025483ET TROJAN LokiBot Fake 404 Response804972095.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249718802021641 11/24/22-19:54:50.807735TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249701802021641 11/24/22-19:54:22.087876TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970180192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497482025483 11/24/22-19:55:54.888388TCP2025483ET TROJAN LokiBot Fake 404 Response804974895.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249720802825766 11/24/22-19:54:54.960633TCP2825766ETPRO TROJAN LokiBot Checkin M24972080192.168.2.695.213.216.202
                    192.168.2.68.8.8.853107532014169 11/24/22-19:54:21.991089UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5310753192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249702802825766 11/24/22-19:54:25.054966TCP2825766ETPRO TROJAN LokiBot Checkin M24970280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249744802025381 11/24/22-19:55:45.028740TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497512025483 11/24/22-19:56:01.147373TCP2025483ET TROJAN LokiBot Fake 404 Response804975195.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249730802021641 11/24/22-19:55:16.067382TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249743802825766 11/24/22-19:55:42.875605TCP2825766ETPRO TROJAN LokiBot Checkin M24974380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249710802024318 11/24/22-19:54:35.914327TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249724802825766 11/24/22-19:55:03.741584TCP2825766ETPRO TROJAN LokiBot Checkin M24972480192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249727802825766 11/24/22-19:55:09.788187TCP2825766ETPRO TROJAN LokiBot Checkin M24972780192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497452025483 11/24/22-19:55:48.824554TCP2025483ET TROJAN LokiBot Fake 404 Response804974595.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249713802024318 11/24/22-19:54:43.021097TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249710802024313 11/24/22-19:54:35.914327TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249718802825766 11/24/22-19:54:50.807735TCP2825766ETPRO TROJAN LokiBot Checkin M24971880192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497092025483 11/24/22-19:54:35.412652TCP2025483ET TROJAN LokiBot Fake 404 Response804970995.213.216.202192.168.2.6
                    95.213.216.202192.168.2.680497232025483 11/24/22-19:55:03.460307TCP2025483ET TROJAN LokiBot Fake 404 Response804972395.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249697802024312 11/24/22-19:54:11.348011TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249707802024313 11/24/22-19:54:31.276699TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970780192.168.2.695.213.216.202
                    192.168.2.68.8.8.862520532014169 11/24/22-19:55:15.969759UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6252053192.168.2.68.8.8.8
                    192.168.2.68.8.8.857322532014169 11/24/22-19:55:39.901358UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5732253192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249713802024313 11/24/22-19:54:43.021097TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249697802024317 11/24/22-19:54:11.348011TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969780192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497262025483 11/24/22-19:55:09.535230TCP2025483ET TROJAN LokiBot Fake 404 Response804972695.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249707802024318 11/24/22-19:54:31.276699TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249746802021641 11/24/22-19:55:49.078874TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974680192.168.2.695.213.216.202
                    95.213.216.202192.168.2.680497012025483 11/24/22-19:54:23.783923TCP2025483ET TROJAN LokiBot Fake 404 Response804970195.213.216.202192.168.2.6
                    192.168.2.695.213.216.20249733802825766 11/24/22-19:55:23.201569TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249752802021641 11/24/22-19:56:01.434635TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249730802825766 11/24/22-19:55:16.067382TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249732802024313 11/24/22-19:55:21.169470TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249726802024318 11/24/22-19:55:07.738200TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249753802025381 11/24/22-19:56:03.443038TCP2025381ET TROJAN LokiBot Checkin4975380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249732802024318 11/24/22-19:55:21.169470TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249705802825766 11/24/22-19:54:27.228813TCP2825766ETPRO TROJAN LokiBot Checkin M24970580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249746802825766 11/24/22-19:55:49.078874TCP2825766ETPRO TROJAN LokiBot Checkin M24974680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249755802021641 11/24/22-19:56:06.881877TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975580192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249747802025381 11/24/22-19:55:51.131718TCP2025381ET TROJAN LokiBot Checkin4974780192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249699802025381 11/24/22-19:54:15.956073TCP2025381ET TROJAN LokiBot Checkin4969980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249726802024313 11/24/22-19:55:07.738200TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249749802021641 11/24/22-19:55:55.139215TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974980192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249698802825766 11/24/22-19:54:13.981663TCP2825766ETPRO TROJAN LokiBot Checkin M24969880192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249727802021641 11/24/22-19:55:09.788187TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972780192.168.2.695.213.216.202
                    192.168.2.68.8.8.852715532014169 11/24/22-19:56:06.802187UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5271553192.168.2.68.8.8.8
                    192.168.2.68.8.8.852079532014169 11/24/22-19:55:21.075805UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5207953192.168.2.68.8.8.8
                    192.168.2.68.8.8.861833532014169 11/24/22-19:55:25.100624UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6183353192.168.2.68.8.8.8
                    192.168.2.695.213.216.20249706802025381 11/24/22-19:54:29.062049TCP2025381ET TROJAN LokiBot Checkin4970680192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249733802021641 11/24/22-19:55:23.201569TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249751802024318 11/24/22-19:55:59.376338TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975180192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249752802825766 11/24/22-19:56:01.434635TCP2825766ETPRO TROJAN LokiBot Checkin M24975280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249712802025381 11/24/22-19:54:40.926341TCP2025381ET TROJAN LokiBot Checkin4971280192.168.2.695.213.216.202
                    192.168.2.695.213.216.20249711802825766 11/24/22-19:54:38.624655TCP2825766ETPRO TROJAN LokiBot Checkin M24971180192.168.2.695.213.216.202
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 24, 2022 19:54:11.286669970 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:11.345004082 CET804969795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:11.345129967 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:11.348011017 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:11.404728889 CET804969795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:11.404869080 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:11.463299036 CET804969795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:13.168977976 CET804969795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:13.169079065 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:13.169225931 CET4969780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:13.225949049 CET804969795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:13.894681931 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:13.958650112 CET804969895.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:13.958801985 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:13.981662989 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:14.045726061 CET804969895.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:14.045902014 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:14.110209942 CET804969895.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:15.576119900 CET804969895.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:15.576334953 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:15.576581955 CET4969880192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:15.640427113 CET804969895.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:15.856637001 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:15.927886963 CET804969995.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:15.928071022 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:15.956073046 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:16.027493954 CET804969995.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:16.027601004 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:16.098913908 CET804969995.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:17.569674015 CET804969995.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:17.569780111 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:17.569870949 CET4969980192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:17.640960932 CET804969995.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:18.143421888 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:18.200618029 CET804970095.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:18.200839043 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:18.249996901 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:18.306715012 CET804970095.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:18.306893110 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:18.363512039 CET804970095.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:20.029122114 CET804970095.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:20.029288054 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:20.981195927 CET4970080192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:21.037904978 CET804970095.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:22.019980907 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:22.083102942 CET804970195.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:22.083247900 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:22.087876081 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:22.151021957 CET804970195.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:22.151093006 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:22.215147972 CET804970195.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:23.783922911 CET804970195.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:23.784240961 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:23.784240961 CET4970180192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:23.848484039 CET804970195.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:24.987267971 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:25.051772118 CET804970295.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:25.051894903 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:25.054965973 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:25.119350910 CET804970295.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:25.119462013 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:25.185128927 CET804970295.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:26.773719072 CET804970295.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:26.773926020 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:26.774003983 CET4970280192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:26.838639975 CET804970295.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:27.158658981 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:27.225601912 CET804970595.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:27.225811958 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:27.228812933 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:27.296253920 CET804970595.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:27.296644926 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:27.363353968 CET804970595.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:28.634654999 CET804970595.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:28.634825945 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:28.634994030 CET4970580192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:28.701540947 CET804970595.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:28.980576992 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:29.043751955 CET804970695.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:29.043917894 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:29.062048912 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:29.125628948 CET804970695.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:29.125740051 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:29.189388037 CET804970695.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:30.867233992 CET804970695.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:30.867374897 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:30.867445946 CET4970680192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:30.930533886 CET804970695.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:31.216176033 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:31.272813082 CET804970795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:31.273060083 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:31.276699066 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:31.333493948 CET804970795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:31.333655119 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:31.390275955 CET804970795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:33.040571928 CET804970795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:33.045016050 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:33.045016050 CET4970780192.168.2.695.213.216.202
                    Nov 24, 2022 19:54:33.101850033 CET804970795.213.216.202192.168.2.6
                    Nov 24, 2022 19:54:33.449861050 CET4970980192.168.2.695.213.216.202
                    TimestampSource PortDest PortSource IPDest IP
                    Nov 24, 2022 19:54:11.254499912 CET5373153192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:11.273976088 CET53537318.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:13.553924084 CET5768653192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:13.892705917 CET53576868.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:15.835585117 CET6438253192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:15.854994059 CET53643828.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:18.123294115 CET5320353192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:18.140840054 CET53532038.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:21.991089106 CET5310753192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:22.012207031 CET53531078.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:24.912578106 CET6460153192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:24.931736946 CET53646018.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:27.135931969 CET4978653192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:27.153167009 CET53497868.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:28.961972952 CET5859553192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:28.979187965 CET53585958.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:31.195563078 CET5633153192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:31.213350058 CET53563318.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:33.429765940 CET5050653192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:33.448172092 CET53505068.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:35.800638914 CET4944853192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:35.820136070 CET53494488.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:38.013432026 CET5908253192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:38.032367945 CET53590828.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:40.838614941 CET5950453192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:40.860896111 CET53595048.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:42.928675890 CET6519853192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:42.948046923 CET53651988.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:44.985894918 CET6291053192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:45.005995035 CET53629108.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:46.995918989 CET6386353192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:47.343003035 CET53638638.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:48.619009018 CET6322953192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:48.638283968 CET53632298.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:50.721247911 CET5490353192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:50.739190102 CET53549038.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:52.685795069 CET5153053192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:52.959728956 CET53515308.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:54.866803885 CET5612253192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:54.884646893 CET53561228.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:56.722023010 CET5255653192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:56.741736889 CET53525568.8.8.8192.168.2.6
                    Nov 24, 2022 19:54:59.613441944 CET6160953192.168.2.68.8.8.8
                    Nov 24, 2022 19:54:59.633409977 CET53616098.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:01.607306957 CET5248153192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:01.624758959 CET53524818.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:03.645658016 CET5394353192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:03.665380001 CET53539438.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:05.605110884 CET5608653192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:05.624840975 CET53560868.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:07.655761003 CET5654753192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:07.675786018 CET53565478.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:09.708350897 CET5988153192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:09.725904942 CET53598818.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:11.700175047 CET5891753192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:11.717746019 CET53589178.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:13.761219025 CET5034353192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:13.780757904 CET53503438.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:15.969758987 CET6252053192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:15.987411976 CET53625208.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:19.049102068 CET5562953192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:19.068536043 CET53556298.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:21.075804949 CET5207953192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:21.095380068 CET53520798.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:23.105212927 CET5656953192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:23.122698069 CET53565698.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:25.100624084 CET6183353192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:25.119568110 CET53618338.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:27.077653885 CET6504453192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:27.096754074 CET53650448.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:29.068969011 CET6003253192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:29.090148926 CET53600328.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:31.114753008 CET4923253192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:31.132338047 CET53492328.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:33.111650944 CET5612353192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:33.130673885 CET53561238.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:35.135406017 CET5975253192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:35.155647993 CET53597528.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:37.629168987 CET5286553192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:37.651962996 CET53528658.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:39.901357889 CET5732253192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:39.918622017 CET53573228.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:40.875534058 CET6295853192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:40.892956972 CET53629588.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:42.774058104 CET6440453192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:42.793642044 CET53644048.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:44.925533056 CET6284853192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:44.944977045 CET53628488.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:46.990731001 CET5595653192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:47.007882118 CET53559568.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:48.986224890 CET5751553192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:49.005459070 CET53575158.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:51.025348902 CET5132153192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:51.042560101 CET53513218.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:53.045222044 CET6108953192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:53.064853907 CET53610898.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:55.046216011 CET6276653192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:55.065582991 CET53627668.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:57.225225925 CET6013053192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:57.242645979 CET53601308.8.8.8192.168.2.6
                    Nov 24, 2022 19:55:59.286288023 CET6273253192.168.2.68.8.8.8
                    Nov 24, 2022 19:55:59.304116011 CET53627328.8.8.8192.168.2.6
                    Nov 24, 2022 19:56:01.353337049 CET6069053192.168.2.68.8.8.8
                    Nov 24, 2022 19:56:01.372248888 CET53606908.8.8.8192.168.2.6
                    Nov 24, 2022 19:56:03.361289024 CET5675053192.168.2.68.8.8.8
                    Nov 24, 2022 19:56:03.381324053 CET53567508.8.8.8192.168.2.6
                    Nov 24, 2022 19:56:04.733170033 CET5933653192.168.2.68.8.8.8
                    Nov 24, 2022 19:56:04.750690937 CET53593368.8.8.8192.168.2.6
                    Nov 24, 2022 19:56:06.802186966 CET5271553192.168.2.68.8.8.8
                    Nov 24, 2022 19:56:06.820142984 CET53527158.8.8.8192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Nov 24, 2022 19:54:11.254499912 CET192.168.2.68.8.8.80x9d33Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:13.553924084 CET192.168.2.68.8.8.80xec24Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:15.835585117 CET192.168.2.68.8.8.80x6c3fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:18.123294115 CET192.168.2.68.8.8.80x9e45Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:21.991089106 CET192.168.2.68.8.8.80x913bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:24.912578106 CET192.168.2.68.8.8.80xf13bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:27.135931969 CET192.168.2.68.8.8.80x3278Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:28.961972952 CET192.168.2.68.8.8.80x88c4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:31.195563078 CET192.168.2.68.8.8.80x811eStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:33.429765940 CET192.168.2.68.8.8.80x5deaStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:35.800638914 CET192.168.2.68.8.8.80x3818Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:38.013432026 CET192.168.2.68.8.8.80xbc15Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:40.838614941 CET192.168.2.68.8.8.80xdfe4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:42.928675890 CET192.168.2.68.8.8.80x467cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:44.985894918 CET192.168.2.68.8.8.80x8e71Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:46.995918989 CET192.168.2.68.8.8.80xdce6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:48.619009018 CET192.168.2.68.8.8.80x64a9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:50.721247911 CET192.168.2.68.8.8.80x44bbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:52.685795069 CET192.168.2.68.8.8.80x15bdStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:54.866803885 CET192.168.2.68.8.8.80xaf57Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:56.722023010 CET192.168.2.68.8.8.80x428cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:59.613441944 CET192.168.2.68.8.8.80x5781Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:01.607306957 CET192.168.2.68.8.8.80x5577Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:03.645658016 CET192.168.2.68.8.8.80xe821Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:05.605110884 CET192.168.2.68.8.8.80x78cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:07.655761003 CET192.168.2.68.8.8.80x88bfStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:09.708350897 CET192.168.2.68.8.8.80x41ddStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:11.700175047 CET192.168.2.68.8.8.80x6184Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:13.761219025 CET192.168.2.68.8.8.80x6a56Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:15.969758987 CET192.168.2.68.8.8.80x5414Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:19.049102068 CET192.168.2.68.8.8.80x7518Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:21.075804949 CET192.168.2.68.8.8.80x4df8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:23.105212927 CET192.168.2.68.8.8.80xcd7fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:25.100624084 CET192.168.2.68.8.8.80x1c89Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:27.077653885 CET192.168.2.68.8.8.80xc1edStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:29.068969011 CET192.168.2.68.8.8.80x72e9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:31.114753008 CET192.168.2.68.8.8.80x3b2bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:33.111650944 CET192.168.2.68.8.8.80xaf95Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:35.135406017 CET192.168.2.68.8.8.80x83f0Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:37.629168987 CET192.168.2.68.8.8.80x7648Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:39.901357889 CET192.168.2.68.8.8.80x44d4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:40.875534058 CET192.168.2.68.8.8.80x10a4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:42.774058104 CET192.168.2.68.8.8.80x8c97Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:44.925533056 CET192.168.2.68.8.8.80xd56bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:46.990731001 CET192.168.2.68.8.8.80xa25fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:48.986224890 CET192.168.2.68.8.8.80x70eeStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:51.025348902 CET192.168.2.68.8.8.80x4c51Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:53.045222044 CET192.168.2.68.8.8.80xf711Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:55.046216011 CET192.168.2.68.8.8.80x6cf7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:57.225225925 CET192.168.2.68.8.8.80x84b4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:59.286288023 CET192.168.2.68.8.8.80xe37Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:01.353337049 CET192.168.2.68.8.8.80x9b9fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:03.361289024 CET192.168.2.68.8.8.80x8ac8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:04.733170033 CET192.168.2.68.8.8.80xb980Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:06.802186966 CET192.168.2.68.8.8.80xdf9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Nov 24, 2022 19:54:11.273976088 CET8.8.8.8192.168.2.60x9d33No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:13.892705917 CET8.8.8.8192.168.2.60xec24No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:15.854994059 CET8.8.8.8192.168.2.60x6c3fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:18.140840054 CET8.8.8.8192.168.2.60x9e45No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:22.012207031 CET8.8.8.8192.168.2.60x913bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:24.931736946 CET8.8.8.8192.168.2.60xf13bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:27.153167009 CET8.8.8.8192.168.2.60x3278No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:28.979187965 CET8.8.8.8192.168.2.60x88c4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:31.213350058 CET8.8.8.8192.168.2.60x811eNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:33.448172092 CET8.8.8.8192.168.2.60x5deaNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:35.820136070 CET8.8.8.8192.168.2.60x3818No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:38.032367945 CET8.8.8.8192.168.2.60xbc15No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:40.860896111 CET8.8.8.8192.168.2.60xdfe4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:42.948046923 CET8.8.8.8192.168.2.60x467cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:45.005995035 CET8.8.8.8192.168.2.60x8e71No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:47.343003035 CET8.8.8.8192.168.2.60xdce6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:48.638283968 CET8.8.8.8192.168.2.60x64a9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:50.739190102 CET8.8.8.8192.168.2.60x44bbNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:52.959728956 CET8.8.8.8192.168.2.60x15bdNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:54.884646893 CET8.8.8.8192.168.2.60xaf57No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:56.741736889 CET8.8.8.8192.168.2.60x428cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:54:59.633409977 CET8.8.8.8192.168.2.60x5781No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:01.624758959 CET8.8.8.8192.168.2.60x5577No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:03.665380001 CET8.8.8.8192.168.2.60xe821No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:05.624840975 CET8.8.8.8192.168.2.60x78cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:07.675786018 CET8.8.8.8192.168.2.60x88bfNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:09.725904942 CET8.8.8.8192.168.2.60x41ddNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:11.717746019 CET8.8.8.8192.168.2.60x6184No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:13.780757904 CET8.8.8.8192.168.2.60x6a56No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:15.987411976 CET8.8.8.8192.168.2.60x5414No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:19.068536043 CET8.8.8.8192.168.2.60x7518No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:21.095380068 CET8.8.8.8192.168.2.60x4df8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:23.122698069 CET8.8.8.8192.168.2.60xcd7fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:25.119568110 CET8.8.8.8192.168.2.60x1c89No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:27.096754074 CET8.8.8.8192.168.2.60xc1edNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:29.090148926 CET8.8.8.8192.168.2.60x72e9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:31.132338047 CET8.8.8.8192.168.2.60x3b2bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:33.130673885 CET8.8.8.8192.168.2.60xaf95No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:35.155647993 CET8.8.8.8192.168.2.60x83f0No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:37.651962996 CET8.8.8.8192.168.2.60x7648No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:39.918622017 CET8.8.8.8192.168.2.60x44d4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:40.892956972 CET8.8.8.8192.168.2.60x10a4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:42.793642044 CET8.8.8.8192.168.2.60x8c97No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:44.944977045 CET8.8.8.8192.168.2.60xd56bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:47.007882118 CET8.8.8.8192.168.2.60xa25fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:49.005459070 CET8.8.8.8192.168.2.60x70eeNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:51.042560101 CET8.8.8.8192.168.2.60x4c51No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:53.064853907 CET8.8.8.8192.168.2.60xf711No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:55.065582991 CET8.8.8.8192.168.2.60x6cf7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:57.242645979 CET8.8.8.8192.168.2.60x84b4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:55:59.304116011 CET8.8.8.8192.168.2.60xe37No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:01.372248888 CET8.8.8.8192.168.2.60x9b9fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:03.381324053 CET8.8.8.8192.168.2.60x8ac8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:04.750690937 CET8.8.8.8192.168.2.60xb980No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    Nov 24, 2022 19:56:06.820142984 CET8.8.8.8192.168.2.60xdf9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                    • sempersim.su

                    Click to jump to process

                    Target ID:0
                    Start time:19:54:02
                    Start date:24/11/2022
                    Path:C:\Users\user\Desktop\Payment_copy28476450.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Users\user\Desktop\Payment_copy28476450.exe
                    Imagebase:0x400000
                    File size:247655 bytes
                    MD5 hash:70E90926399154C2708801A73CF53D99
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low

                    Target ID:1
                    Start time:19:54:03
                    Start date:24/11/2022
                    Path:C:\Users\user\AppData\Local\Temp\wcycejenv.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                    Imagebase:0x400000
                    File size:340992 bytes
                    MD5 hash:3182BEF520A1E9F52BE3755C25E4C3B0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.259864404.0000000000610000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Antivirus matches:
                    • Detection: 50%, ReversingLabs
                    • Detection: 23%, Virustotal, Browse
                    Reputation:low

                    Target ID:2
                    Start time:19:54:03
                    Start date:24/11/2022
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff6da640000
                    File size:625664 bytes
                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high

                    Target ID:3
                    Start time:19:54:04
                    Start date:24/11/2022
                    Path:C:\Users\user\AppData\Local\Temp\wcycejenv.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\AppData\Local\Temp\wcycejenv.exe" C:\Users\user\AppData\Local\Temp\stvrrcrc.d
                    Imagebase:0x400000
                    File size:340992 bytes
                    MD5 hash:3182BEF520A1E9F52BE3755C25E4C3B0
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000000.253960864.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000003.00000002.510358180.0000000000737000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                    • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000002.510096240.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    No disassembly