Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INV.2022LB0362 FORM CO (2).exe

Overview

General Information

Sample Name:INV.2022LB0362 FORM CO (2).exe
Analysis ID:756310
MD5:baed30aea51e6000571219633aa745b0
SHA1:d7e3b155c00245a7f867dd2fb4c06cb7be6ec3f7
SHA256:57520e51bb0820741b7883926800223886c491a8a5ddd517a49b0e2cc752fb18
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gm11/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x180c8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x5493:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
          • 0x13278:$s1: http://
          • 0x16233:$s1: http://
          • 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          • 0x13280:$s2: https://
          • 0x13278:$f1: http://
          • 0x16233:$f1: http://
          • 0x13280:$f2: https://
          0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            Click to see the 43 entries
            No Sigma rule has matched
            Timestamp:192.168.2.395.213.216.20249705802024318 11/30/22-00:54:20.168790
            SID:2024318
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802021641 11/30/22-00:54:14.871390
            SID:2021641
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802024313 11/30/22-00:55:23.450513
            SID:2024313
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802825766 11/30/22-00:55:16.065951
            SID:2825766
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497272025483 11/30/22-00:55:04.982566
            SID:2025483
            Source Port:80
            Destination Port:49727
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802024313 11/30/22-00:55:29.247109
            SID:2024313
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802825766 11/30/22-00:54:12.581436
            SID:2825766
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802025381 11/30/22-00:55:43.976237
            SID:2025381
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802825766 11/30/22-00:56:01.042444
            SID:2825766
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802024318 11/30/22-00:55:23.450513
            SID:2024318
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802021641 11/30/22-00:55:17.863854
            SID:2021641
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802024313 11/30/22-00:54:20.168790
            SID:2024313
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802024318 11/30/22-00:55:29.247109
            SID:2024318
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497232025483 11/30/22-00:54:57.894669
            SID:2025483
            Source Port:80
            Destination Port:49723
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802025381 11/30/22-00:55:49.378987
            SID:2025381
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802025381 11/30/22-00:54:43.829219
            SID:2025381
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802021641 11/30/22-00:54:24.716724
            SID:2021641
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802025381 11/30/22-00:55:58.948901
            SID:2025381
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802021641 11/30/22-00:55:08.823725
            SID:2021641
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.861416532014169 11/30/22-00:55:12.379224
            SID:2014169
            Source Port:61416
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860088532014169 11/30/22-00:55:21.529314
            SID:2014169
            Source Port:60088
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249713802024313 11/30/22-00:54:37.979213
            SID:2024313
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802825766 11/30/22-00:55:01.673863
            SID:2825766
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802024318 11/30/22-00:54:37.979213
            SID:2024318
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857743532014169 11/30/22-00:55:08.735474
            SID:2014169
            Source Port:57743
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802825766 11/30/22-00:55:53.496270
            SID:2825766
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497572025483 11/30/22-00:55:59.773200
            SID:2025483
            Source Port:80
            Destination Port:49757
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802025381 11/30/22-00:55:34.401351
            SID:2025381
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859820532014169 11/30/22-00:55:29.162121
            SID:2014169
            Source Port:59820
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853305532014169 11/30/22-00:54:54.648302
            SID:2014169
            Source Port:53305
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497532025483 11/30/22-00:55:52.887247
            SID:2025483
            Source Port:80
            Destination Port:49753
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802025381 11/30/22-00:54:26.803652
            SID:2025381
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497162025483 11/30/22-00:54:45.204539
            SID:2025483
            Source Port:80
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497382025483 11/30/22-00:55:24.982216
            SID:2025483
            Source Port:80
            Destination Port:49738
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802024313 11/30/22-00:56:00.034214
            SID:2024313
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802021641 11/30/22-00:55:55.653974
            SID:2021641
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497302025483 11/30/22-00:55:10.337695
            SID:2025483
            Source Port:80
            Destination Port:49730
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497342025483 11/30/22-00:55:17.565495
            SID:2025483
            Source Port:80
            Destination Port:49734
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802024318 11/30/22-00:56:00.034214
            SID:2024318
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852387532014169 11/30/22-00:54:14.412323
            SID:2014169
            Source Port:52387
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802024318 11/30/22-00:54:53.572062
            SID:2024318
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802021641 11/30/22-00:55:03.486766
            SID:2021641
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802021641 11/30/22-00:55:45.758418
            SID:2021641
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497122025483 11/30/22-00:54:37.552263
            SID:2025483
            Source Port:80
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802825766 11/30/22-00:54:47.592007
            SID:2825766
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.851992532014169 11/30/22-00:55:36.286012
            SID:2014169
            Source Port:51992
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860625532014169 11/30/22-00:54:18.863516
            SID:2014169
            Source Port:60625
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802025381 11/30/22-00:55:19.643476
            SID:2025381
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249721802024313 11/30/22-00:54:53.572062
            SID:2024313
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802825766 11/30/22-00:55:38.275174
            SID:2825766
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802021641 11/30/22-00:54:54.732179
            SID:2021641
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802025381 11/30/22-00:54:07.324934
            SID:2025381
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802021641 11/30/22-00:54:39.977728
            SID:2021641
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497492025483 11/30/22-00:55:45.483574
            SID:2025483
            Source Port:80
            Destination Port:49749
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802025381 11/30/22-00:54:35.972913
            SID:2025381
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857840532014169 11/30/22-00:54:09.401173
            SID:2014169
            Source Port:57840
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.858301532014169 11/30/22-00:55:42.001541
            SID:2014169
            Source Port:58301
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802025381 11/30/22-00:55:27.193434
            SID:2025381
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497422025483 11/30/22-00:55:32.668199
            SID:2025483
            Source Port:80
            Destination Port:49742
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.863562532014169 11/30/22-00:55:23.368358
            SID:2014169
            Source Port:63562
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497412025483 11/30/22-00:55:30.821604
            SID:2025483
            Source Port:80
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.850784532014169 11/30/22-00:55:55.557056
            SID:2014169
            Source Port:50784
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249723802021641 11/30/22-00:54:56.463103
            SID:2021641
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802825766 11/30/22-00:54:37.979213
            SID:2825766
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802024313 11/30/22-00:55:01.673863
            SID:2024313
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802025381 11/30/22-00:55:05.285201
            SID:2025381
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802024318 11/30/22-00:55:01.673863
            SID:2024318
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802025381 11/30/22-00:55:21.614296
            SID:2025381
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497112025483 11/30/22-00:54:35.462242
            SID:2025483
            Source Port:80
            Destination Port:49711
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.856949532014169 11/30/22-00:54:59.841953
            SID:2014169
            Source Port:56949
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249753802024318 11/30/22-00:55:51.242717
            SID:2024318
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802024313 11/30/22-00:55:51.242717
            SID:2024313
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497082025483 11/30/22-00:54:28.382639
            SID:2025483
            Source Port:80
            Destination Port:49708
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802825766 11/30/22-00:54:39.977728
            SID:2825766
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802024313 11/30/22-00:54:59.930841
            SID:2024313
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802025381 11/30/22-00:55:57.533680
            SID:2025381
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860825532014169 11/30/22-00:55:59.940841
            SID:2014169
            Source Port:60825
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802024313 11/30/22-00:55:53.496270
            SID:2024313
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802021641 11/30/22-00:55:42.098367
            SID:2021641
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802024318 11/30/22-00:54:59.930841
            SID:2024318
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802021641 11/30/22-00:55:31.101064
            SID:2021641
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802825766 11/30/22-00:55:55.653974
            SID:2825766
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249754802024318 11/30/22-00:55:53.496270
            SID:2024318
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802025381 11/30/22-00:54:29.164231
            SID:2025381
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849977532014169 11/30/22-00:54:06.875981
            SID:2014169
            Source Port:49977
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.856924532014169 11/30/22-00:54:16.879287
            SID:2014169
            Source Port:56924
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249700802024317 11/30/22-00:54:09.487691
            SID:2024317
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802825766 11/30/22-00:55:25.267085
            SID:2825766
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860582532014169 11/30/22-00:54:28.778637
            SID:2014169
            Source Port:60582
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497192025483 11/30/22-00:54:51.280995
            SID:2025483
            Source Port:80
            Destination Port:49719
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864595532014169 11/30/22-00:55:31.020256
            SID:2014169
            Source Port:64595
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249742802825766 11/30/22-00:55:31.101064
            SID:2825766
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802024312 11/30/22-00:54:09.487691
            SID:2024312
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802025381 11/30/22-00:54:33.859062
            SID:2025381
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860767532014169 11/30/22-00:54:45.460012
            SID:2014169
            Source Port:60767
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249739802021641 11/30/22-00:55:25.267085
            SID:2021641
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802025381 11/30/22-00:54:58.184483
            SID:2025381
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802021641 11/30/22-00:55:47.279515
            SID:2021641
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802825766 11/30/22-00:56:00.034214
            SID:2825766
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802021641 11/30/22-00:54:31.910937
            SID:2021641
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802021641 11/30/22-00:54:33.859062
            SID:2021641
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849201532014169 11/30/22-00:56:00.958664
            SID:2014169
            Source Port:49201
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249729802024313 11/30/22-00:55:07.068054
            SID:2024313
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802025381 11/30/22-00:56:00.034214
            SID:2025381
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497262025483 11/30/22-00:55:03.204141
            SID:2025483
            Source Port:80
            Destination Port:49726
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802025381 11/30/22-00:55:32.962709
            SID:2025381
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802024318 11/30/22-00:55:07.068054
            SID:2024318
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802021641 11/30/22-00:55:34.401351
            SID:2021641
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802021641 11/30/22-00:55:01.673863
            SID:2021641
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802024313 11/30/22-00:55:45.758418
            SID:2024313
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802825766 11/30/22-00:54:31.910937
            SID:2825766
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497222025483 11/30/22-00:54:56.166551
            SID:2025483
            Source Port:80
            Destination Port:49722
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802024318 11/30/22-00:55:45.758418
            SID:2024318
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802021641 11/30/22-00:54:07.324934
            SID:2021641
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497202025483 11/30/22-00:54:53.259308
            SID:2025483
            Source Port:80
            Destination Port:49720
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802021641 11/30/22-00:54:12.581436
            SID:2021641
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853623532014169 11/30/22-00:55:10.547934
            SID:2014169
            Source Port:53623
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802021641 11/30/22-00:55:53.496270
            SID:2021641
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802025381 11/30/22-00:54:42.060768
            SID:2025381
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852955532014169 11/30/22-00:54:26.705694
            SID:2014169
            Source Port:52955
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802024313 11/30/22-00:55:27.193434
            SID:2024313
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249740802024318 11/30/22-00:55:27.193434
            SID:2024318
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802025381 11/30/22-00:55:23.450513
            SID:2025381
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802021641 11/30/22-00:55:10.632751
            SID:2021641
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802021641 11/30/22-00:55:49.378987
            SID:2021641
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802021641 11/30/22-00:54:16.960834
            SID:2021641
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802024313 11/30/22-00:54:35.972913
            SID:2024313
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802825766 11/30/22-00:55:03.486766
            SID:2825766
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802025381 11/30/22-00:54:45.540558
            SID:2025381
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859581532014169 11/30/22-00:55:17.784201
            SID:2014169
            Source Port:59581
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249712802024318 11/30/22-00:54:35.972913
            SID:2024318
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497312025483 11/30/22-00:55:12.166821
            SID:2025483
            Source Port:80
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802024313 11/30/22-00:55:25.267085
            SID:2024313
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802025381 11/30/22-00:54:59.930841
            SID:2025381
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849166532014169 11/30/22-00:55:40.126118
            SID:2014169
            Source Port:49166
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860749532014169 11/30/22-00:54:58.103973
            SID:2014169
            Source Port:60749
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497052025483 11/30/22-00:54:21.783216
            SID:2025483
            Source Port:80
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853975532014169 11/30/22-00:54:22.160619
            SID:2014169
            Source Port:53975
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249753802025381 11/30/22-00:55:51.242717
            SID:2025381
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802021641 11/30/22-00:55:58.948901
            SID:2021641
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802021641 11/30/22-00:54:43.829219
            SID:2021641
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802024318 11/30/22-00:55:25.267085
            SID:2024318
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802825766 11/30/22-00:55:29.247109
            SID:2825766
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802825766 11/30/22-00:54:09.487691
            SID:2825766
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802024313 11/30/22-00:54:51.608521
            SID:2024313
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802024318 11/30/22-00:54:26.803652
            SID:2024318
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497482025483 11/30/22-00:55:43.661913
            SID:2025483
            Source Port:80
            Destination Port:49748
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802825766 11/30/22-00:55:10.632751
            SID:2825766
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802024313 11/30/22-00:54:14.871390
            SID:2024313
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802024318 11/30/22-00:54:51.608521
            SID:2024318
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802825766 11/30/22-00:55:21.614296
            SID:2825766
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802024318 11/30/22-00:54:14.871390
            SID:2024318
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802825766 11/30/22-00:54:49.641508
            SID:2825766
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.863446532014169 11/30/22-00:55:43.898414
            SID:2014169
            Source Port:63446
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497092025483 11/30/22-00:54:30.691043
            SID:2025483
            Source Port:80
            Destination Port:49709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497432025483 11/30/22-00:55:34.122250
            SID:2025483
            Source Port:80
            Destination Port:49743
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802024313 11/30/22-00:54:26.803652
            SID:2024313
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858119532014169 11/30/22-00:55:38.197046
            SID:2014169
            Source Port:58119
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.857990532014169 11/30/22-00:54:11.706174
            SID:2014169
            Source Port:57990
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249759802024318 11/30/22-00:56:01.042444
            SID:2024318
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802825766 11/30/22-00:54:29.164231
            SID:2825766
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802024313 11/30/22-00:55:08.823725
            SID:2024313
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802025381 11/30/22-00:55:36.377571
            SID:2025381
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802021641 11/30/22-00:54:58.184483
            SID:2021641
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802024313 11/30/22-00:56:01.042444
            SID:2024313
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802825766 11/30/22-00:54:16.960834
            SID:2825766
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802025381 11/30/22-00:54:18.966132
            SID:2025381
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497152025483 11/30/22-00:54:43.541337
            SID:2025483
            Source Port:80
            Destination Port:49715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802024318 11/30/22-00:55:08.823725
            SID:2024318
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802024318 11/30/22-00:54:47.592007
            SID:2024318
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864121532014169 11/30/22-00:55:57.444180
            SID:2014169
            Source Port:64121
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249719802021641 11/30/22-00:54:49.641508
            SID:2021641
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249721802825766 11/30/22-00:54:53.572062
            SID:2825766
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497042025483 11/30/22-00:54:19.714505
            SID:2025483
            Source Port:80
            Destination Port:49704
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802021641 11/30/22-00:55:40.214633
            SID:2021641
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849874532014169 11/30/22-00:55:45.675021
            SID:2014169
            Source Port:49874
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249722802025381 11/30/22-00:54:54.732179
            SID:2025381
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802024313 11/30/22-00:54:47.592007
            SID:2024313
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853428532014169 11/30/22-00:55:25.189214
            SID:2014169
            Source Port:53428
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802024318 11/30/22-00:55:19.643476
            SID:2024318
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249736802024313 11/30/22-00:55:19.643476
            SID:2024313
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802025381 11/30/22-00:55:12.457821
            SID:2025381
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497592025483 11/30/22-00:56:01.793951
            SID:2025483
            Source Port:80
            Destination Port:49759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802024318 11/30/22-00:55:38.275174
            SID:2024318
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802024318 11/30/22-00:55:43.976237
            SID:2024318
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802021641 11/30/22-00:55:21.614296
            SID:2021641
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802024313 11/30/22-00:55:38.275174
            SID:2024313
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497542025483 11/30/22-00:55:55.161061
            SID:2025483
            Source Port:80
            Destination Port:49754
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802025381 11/30/22-00:55:17.863854
            SID:2025381
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802021641 11/30/22-00:54:22.484255
            SID:2021641
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802021641 11/30/22-00:55:16.065951
            SID:2021641
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802825766 11/30/22-00:54:07.324934
            SID:2825766
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497322025483 11/30/22-00:55:13.950022
            SID:2025483
            Source Port:80
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497372025483 11/30/22-00:55:23.147009
            SID:2025483
            Source Port:80
            Destination Port:49737
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802024313 11/30/22-00:55:43.976237
            SID:2024313
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802025381 11/30/22-00:55:42.098367
            SID:2025381
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497212025483 11/30/22-00:54:54.418787
            SID:2025483
            Source Port:80
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497102025483 11/30/22-00:54:33.459515
            SID:2025483
            Source Port:80
            Destination Port:49710
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802024313 11/30/22-00:55:14.244291
            SID:2024313
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802025381 11/30/22-00:54:24.716724
            SID:2025381
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802024318 11/30/22-00:55:14.244291
            SID:2024318
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.851139532014169 11/30/22-00:54:24.370686
            SID:2014169
            Source Port:51139
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802021641 11/30/22-00:54:53.572062
            SID:2021641
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802825766 11/30/22-00:55:40.214633
            SID:2825766
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802825766 11/30/22-00:54:22.484255
            SID:2825766
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802021641 11/30/22-00:54:29.164231
            SID:2021641
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.855638532014169 11/30/22-00:54:39.891168
            SID:2014169
            Source Port:55638
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853466532014169 11/30/22-00:55:06.970990
            SID:2014169
            Source Port:53466
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249717802021641 11/30/22-00:54:45.540558
            SID:2021641
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864823532014169 11/30/22-00:55:34.318234
            SID:2014169
            Source Port:64823
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249706802025381 11/30/22-00:54:22.484255
            SID:2025381
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802825766 11/30/22-00:54:43.829219
            SID:2825766
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802021641 11/30/22-00:54:51.608521
            SID:2021641
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865017532014169 11/30/22-00:55:05.186135
            SID:2014169
            Source Port:65017
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249734802025381 11/30/22-00:55:16.065951
            SID:2025381
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802024318 11/30/22-00:54:56.463103
            SID:2024318
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864602532014169 11/30/22-00:55:53.393350
            SID:2014169
            Source Port:64602
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497252025483 11/30/22-00:55:01.390776
            SID:2025483
            Source Port:80
            Destination Port:49725
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497292025483 11/30/22-00:55:08.539654
            SID:2025483
            Source Port:80
            Destination Port:49729
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802024313 11/30/22-00:54:56.463103
            SID:2024313
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853848532014169 11/30/22-00:54:49.539403
            SID:2014169
            Source Port:53848
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249744802825766 11/30/22-00:55:34.401351
            SID:2825766
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865107532014169 11/30/22-00:54:47.470066
            SID:2014169
            Source Port:65107
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249739802025381 11/30/22-00:55:25.267085
            SID:2025381
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802021641 11/30/22-00:54:35.972913
            SID:2021641
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802021641 11/30/22-00:55:51.242717
            SID:2021641
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802021641 11/30/22-00:54:59.930841
            SID:2021641
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802024318 11/30/22-00:55:42.098367
            SID:2024318
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802024313 11/30/22-00:55:10.632751
            SID:2024313
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802024313 11/30/22-00:55:42.098367
            SID:2024313
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865196532014169 11/30/22-00:55:14.166464
            SID:2014169
            Source Port:65196
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249731802024318 11/30/22-00:55:10.632751
            SID:2024318
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802825766 11/30/22-00:54:26.803652
            SID:2825766
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802825766 11/30/22-00:55:43.976237
            SID:2825766
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802024313 11/30/22-00:55:32.962709
            SID:2024313
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802825766 11/30/22-00:55:58.948901
            SID:2825766
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802024318 11/30/22-00:55:32.962709
            SID:2024318
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802024318 11/30/22-00:55:05.285201
            SID:2024318
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802025381 11/30/22-00:55:45.758418
            SID:2025381
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802021641 11/30/22-00:54:09.487691
            SID:2021641
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802024313 11/30/22-00:55:05.285201
            SID:2024313
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802025381 11/30/22-00:54:39.977728
            SID:2025381
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802825766 11/30/22-00:54:58.184483
            SID:2825766
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802025381 11/30/22-00:54:49.641508
            SID:2025381
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802024318 11/30/22-00:55:57.533680
            SID:2024318
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802025381 11/30/22-00:55:31.101064
            SID:2025381
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802021641 11/30/22-00:55:14.244291
            SID:2021641
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802825766 11/30/22-00:55:07.068054
            SID:2825766
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857704532014169 11/30/22-00:54:41.979608
            SID:2014169
            Source Port:57704
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249715802024318 11/30/22-00:54:42.060768
            SID:2024318
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802825766 11/30/22-00:55:49.378987
            SID:2825766
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802024313 11/30/22-00:55:57.533680
            SID:2024313
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802024313 11/30/22-00:54:42.060768
            SID:2024313
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802024313 11/30/22-00:55:47.279515
            SID:2024313
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802825766 11/30/22-00:54:33.859062
            SID:2825766
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802024318 11/30/22-00:55:47.279515
            SID:2024318
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802024318 11/30/22-00:54:31.910937
            SID:2024318
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802024313 11/30/22-00:54:31.910937
            SID:2024313
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802025381 11/30/22-00:55:40.214633
            SID:2025381
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802025381 11/30/22-00:54:12.581436
            SID:2025381
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802025381 11/30/22-00:55:55.653974
            SID:2025381
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802021641 11/30/22-00:55:07.068054
            SID:2021641
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497442025483 11/30/22-00:55:36.086250
            SID:2025483
            Source Port:80
            Destination Port:49744
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802024318 11/30/22-00:55:17.863854
            SID:2024318
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853049532014169 11/30/22-00:55:19.563471
            SID:2014169
            Source Port:53049
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249735802024313 11/30/22-00:55:17.863854
            SID:2024313
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802024313 11/30/22-00:55:34.401351
            SID:2024313
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497472025483 11/30/22-00:55:41.771804
            SID:2025483
            Source Port:80
            Destination Port:49747
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802024318 11/30/22-00:55:34.401351
            SID:2024318
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802021641 11/30/22-00:55:29.247109
            SID:2021641
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802825766 11/30/22-00:54:18.966132
            SID:2825766
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802025381 11/30/22-00:55:38.275174
            SID:2025381
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802021641 11/30/22-00:55:12.457821
            SID:2021641
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802024312 11/30/22-00:54:07.324934
            SID:2024312
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802024313 11/30/22-00:54:24.716724
            SID:2024313
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497062025483 11/30/22-00:54:24.053489
            SID:2025483
            Source Port:80
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497502025483 11/30/22-00:55:46.963833
            SID:2025483
            Source Port:80
            Destination Port:49750
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802024317 11/30/22-00:54:07.324934
            SID:2024317
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802025381 11/30/22-00:55:03.486766
            SID:2025381
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865511532014169 11/30/22-00:55:27.103034
            SID:2014169
            Source Port:65511
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.864967532014169 11/30/22-00:55:58.869049
            SID:2014169
            Source Port:64967
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802025381 11/30/22-00:54:53.572062
            SID:2025381
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802024318 11/30/22-00:54:24.716724
            SID:2024318
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802021641 11/30/22-00:54:37.979213
            SID:2021641
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802825766 11/30/22-00:55:12.457821
            SID:2825766
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802825766 11/30/22-00:55:47.279515
            SID:2825766
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497552025483 11/30/22-00:55:57.270722
            SID:2025483
            Source Port:80
            Destination Port:49755
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497582025483 11/30/22-00:56:00.797031
            SID:2025483
            Source Port:80
            Destination Port:49758
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497362025483 11/30/22-00:55:21.118367
            SID:2025483
            Source Port:80
            Destination Port:49736
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802024318 11/30/22-00:54:16.960834
            SID:2024318
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802025381 11/30/22-00:54:14.871390
            SID:2025381
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802024313 11/30/22-00:54:16.960834
            SID:2024313
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857134532014169 11/30/22-00:54:31.820802
            SID:2014169
            Source Port:57134
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249758802021641 11/30/22-00:56:00.034214
            SID:2021641
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858691532014169 11/30/22-00:54:53.455722
            SID:2014169
            Source Port:58691
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802825766 11/30/22-00:55:19.643476
            SID:2825766
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802025381 11/30/22-00:54:20.168790
            SID:2025381
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497332025483 11/30/22-00:55:15.751744
            SID:2025483
            Source Port:80
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802825766 11/30/22-00:55:36.377571
            SID:2825766
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497032025483 11/30/22-00:54:18.541620
            SID:2025483
            Source Port:80
            Destination Port:49703
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497142025483 11/30/22-00:54:41.602416
            SID:2025483
            Source Port:80
            Destination Port:49714
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802024313 11/30/22-00:54:43.829219
            SID:2024313
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859433532014169 11/30/22-00:54:56.376062
            SID:2014169
            Source Port:59433
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249757802024313 11/30/22-00:55:58.948901
            SID:2024313
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802825766 11/30/22-00:54:45.540558
            SID:2825766
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802024313 11/30/22-00:54:54.732179
            SID:2024313
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802024318 11/30/22-00:54:43.829219
            SID:2024318
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802025381 11/30/22-00:56:01.042444
            SID:2025381
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802024318 11/30/22-00:55:58.948901
            SID:2024318
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802825766 11/30/22-00:54:56.463103
            SID:2825766
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802025381 11/30/22-00:54:47.592007
            SID:2025381
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802025381 11/30/22-00:55:08.823725
            SID:2025381
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802021641 11/30/22-00:54:18.966132
            SID:2021641
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802024318 11/30/22-00:54:54.732179
            SID:2024318
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802021641 11/30/22-00:55:36.377571
            SID:2021641
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802024313 11/30/22-00:54:39.977728
            SID:2024313
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802825766 11/30/22-00:54:59.930841
            SID:2825766
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802025381 11/30/22-00:54:09.487691
            SID:2025381
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802024318 11/30/22-00:54:39.977728
            SID:2024318
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858708532014169 11/30/22-00:55:15.985743
            SID:2014169
            Source Port:58708
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497282025483 11/30/22-00:55:06.759571
            SID:2025483
            Source Port:80
            Destination Port:49728
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802024318 11/30/22-00:55:12.457821
            SID:2024318
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802825766 11/30/22-00:54:24.716724
            SID:2825766
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497242025483 11/30/22-00:54:59.594972
            SID:2025483
            Source Port:80
            Destination Port:49724
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802024313 11/30/22-00:55:12.457821
            SID:2024313
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802021641 11/30/22-00:54:26.803652
            SID:2021641
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802024318 11/30/22-00:54:58.184483
            SID:2024318
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802021641 11/30/22-00:56:01.042444
            SID:2021641
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802025381 11/30/22-00:55:47.279515
            SID:2025381
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802024313 11/30/22-00:54:58.184483
            SID:2024313
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802025381 11/30/22-00:54:31.910937
            SID:2025381
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802825766 11/30/22-00:54:42.060768
            SID:2825766
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802024318 11/30/22-00:55:40.214633
            SID:2024318
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802024313 11/30/22-00:55:40.214633
            SID:2024313
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802024313 11/30/22-00:54:49.641508
            SID:2024313
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802825766 11/30/22-00:55:32.962709
            SID:2825766
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857571532014169 11/30/22-00:54:51.528645
            SID:2014169
            Source Port:57571
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249719802024318 11/30/22-00:54:49.641508
            SID:2024318
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802024318 11/30/22-00:55:31.101064
            SID:2024318
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859636532014169 11/30/22-00:54:37.879679
            SID:2014169
            Source Port:59636
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249720802825766 11/30/22-00:54:51.608521
            SID:2825766
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802024313 11/30/22-00:55:31.101064
            SID:2024313
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802021641 11/30/22-00:54:47.592007
            SID:2021641
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802025381 11/30/22-00:55:14.244291
            SID:2025381
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249736802021641 11/30/22-00:55:19.643476
            SID:2021641
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802021641 11/30/22-00:55:38.275174
            SID:2021641
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802024318 11/30/22-00:55:16.065951
            SID:2024318
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802025381 11/30/22-00:54:56.463103
            SID:2025381
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802825766 11/30/22-00:55:42.098367
            SID:2825766
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802024313 11/30/22-00:55:21.614296
            SID:2024313
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497562025483 11/30/22-00:55:58.723099
            SID:2025483
            Source Port:80
            Destination Port:49756
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802825766 11/30/22-00:54:14.871390
            SID:2825766
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802024318 11/30/22-00:55:21.614296
            SID:2024318
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802825766 11/30/22-00:55:08.823725
            SID:2825766
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802024313 11/30/22-00:54:22.484255
            SID:2024313
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802024313 11/30/22-00:55:16.065951
            SID:2024313
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497352025483 11/30/22-00:55:19.347023
            SID:2025483
            Source Port:80
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802024318 11/30/22-00:54:22.484255
            SID:2024318
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497522025483 11/30/22-00:55:50.930381
            SID:2025483
            Source Port:80
            Destination Port:49752
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497172025483 11/30/22-00:54:47.032787
            SID:2025483
            Source Port:80
            Destination Port:49717
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802825766 11/30/22-00:55:14.244291
            SID:2825766
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497392025483 11/30/22-00:55:26.908255
            SID:2025483
            Source Port:80
            Destination Port:49739
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802025381 11/30/22-00:54:51.608521
            SID:2025381
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802021641 11/30/22-00:55:43.976237
            SID:2021641
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865320532014169 11/30/22-00:54:43.751689
            SID:2014169
            Source Port:65320
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249735802825766 11/30/22-00:55:17.863854
            SID:2825766
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852079532014169 11/30/22-00:55:32.870195
            SID:2014169
            Source Port:52079
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497012025483 11/30/22-00:54:14.085146
            SID:2025483
            Source Port:80
            Destination Port:49701
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802025381 11/30/22-00:55:10.632751
            SID:2025381
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802024318 11/30/22-00:54:29.164231
            SID:2024318
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802024318 11/30/22-00:55:36.377571
            SID:2024318
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802024313 11/30/22-00:54:29.164231
            SID:2024313
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802825766 11/30/22-00:54:20.168790
            SID:2825766
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802024313 11/30/22-00:55:36.377571
            SID:2024313
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802024318 11/30/22-00:54:18.966132
            SID:2024318
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802024313 11/30/22-00:54:18.966132
            SID:2024313
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802024313 11/30/22-00:54:45.540558
            SID:2024313
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802825766 11/30/22-00:54:54.732179
            SID:2825766
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802025381 11/30/22-00:54:16.960834
            SID:2025381
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849302532014169 11/30/22-00:54:20.078245
            SID:2014169
            Source Port:49302
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249711802024313 11/30/22-00:54:33.859062
            SID:2024313
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802825766 11/30/22-00:55:05.285201
            SID:2825766
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802021641 11/30/22-00:54:20.168790
            SID:2021641
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802024318 11/30/22-00:54:33.859062
            SID:2024318
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802021641 11/30/22-00:55:23.450513
            SID:2021641
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865385532014169 11/30/22-00:55:49.289719
            SID:2014169
            Source Port:65385
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802825766 11/30/22-00:55:27.193434
            SID:2825766
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497452025483 11/30/22-00:55:37.973570
            SID:2025483
            Source Port:80
            Destination Port:49745
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497462025483 11/30/22-00:55:39.906968
            SID:2025483
            Source Port:80
            Destination Port:49746
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497402025483 11/30/22-00:55:28.902821
            SID:2025483
            Source Port:80
            Destination Port:49740
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802024318 11/30/22-00:54:45.540558
            SID:2024318
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802024313 11/30/22-00:54:12.581436
            SID:2024313
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802825766 11/30/22-00:55:23.450513
            SID:2825766
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497132025483 11/30/22-00:54:39.587400
            SID:2025483
            Source Port:80
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802024318 11/30/22-00:54:12.581436
            SID:2024318
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802825766 11/30/22-00:55:57.533680
            SID:2825766
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497022025483 11/30/22-00:54:16.469088
            SID:2025483
            Source Port:80
            Destination Port:49702
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802825766 11/30/22-00:55:45.758418
            SID:2825766
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802021641 11/30/22-00:55:32.962709
            SID:2021641
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249740802021641 11/30/22-00:55:27.193434
            SID:2021641
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802025381 11/30/22-00:55:07.068054
            SID:2025381
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802024313 11/30/22-00:55:49.378987
            SID:2024313
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802025381 11/30/22-00:55:29.247109
            SID:2025381
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802025381 11/30/22-00:55:01.673863
            SID:2025381
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802024318 11/30/22-00:55:49.378987
            SID:2024318
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.856042532014169 11/30/22-00:54:35.894646
            SID:2014169
            Source Port:56042
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853844532014169 11/30/22-00:55:03.396283
            SID:2014169
            Source Port:53844
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.862050532014169 11/30/22-00:54:33.763792
            SID:2014169
            Source Port:62050
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249728802021641 11/30/22-00:55:05.285201
            SID:2021641
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497512025483 11/30/22-00:55:49.068855
            SID:2025483
            Source Port:80
            Destination Port:49751
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802024318 11/30/22-00:55:55.653974
            SID:2024318
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497182025483 11/30/22-00:54:49.052316
            SID:2025483
            Source Port:80
            Destination Port:49718
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852547532014169 11/30/22-00:55:01.596754
            SID:2014169
            Source Port:52547
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249755802024313 11/30/22-00:55:55.653974
            SID:2024313
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802024318 11/30/22-00:55:03.486766
            SID:2024318
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802025381 11/30/22-00:54:37.979213
            SID:2025381
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802021641 11/30/22-00:55:57.533680
            SID:2021641
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865459532014169 11/30/22-00:55:47.178193
            SID:2014169
            Source Port:65459
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497072025483 11/30/22-00:54:26.372322
            SID:2025483
            Source Port:80
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802021641 11/30/22-00:54:42.060768
            SID:2021641
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802825766 11/30/22-00:54:35.972913
            SID:2825766
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802825766 11/30/22-00:55:51.242717
            SID:2825766
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.854153532014169 11/30/22-00:55:51.152832
            SID:2014169
            Source Port:54153
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802025381 11/30/22-00:55:53.496270
            SID:2025381
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802024313 11/30/22-00:55:03.486766
            SID:2024313
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: INV.2022LB0362 FORM CO (2).exeReversingLabs: Detection: 70%
            Source: INV.2022LB0362 FORM CO (2).exeVirustotal: Detection: 56%Perma Link
            Source: http://sempersim.su/gm11/fre.phpAvira URL Cloud: Label: malware
            Source: sempersim.suVirustotal: Detection: 25%Perma Link
            Source: http://sempersim.su/gm11/fre.phpVirustotal: Detection: 25%Perma Link
            Source: INV.2022LB0362 FORM CO (2).exeJoe Sandbox ML: detected
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gm11/fre.php"]}
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49977 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57840 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57990 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49701
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52387 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49702
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56924 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49703
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60625 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49704
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49302 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49705
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53975 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49706
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:51139 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49707
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52955 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49708
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60582 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49709
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57134 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49710
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:62050 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49711
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56042 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49712
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59636 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49713
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:55638 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49714
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57704 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49715
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65320 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49716
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60767 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49717
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65107 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49718
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53848 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49719
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57571 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49720
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58691 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49721
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53305 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49722
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59433 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49723
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60749 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49724
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56949 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49725
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52547 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49726
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53844 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49727
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65017 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49728
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53466 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49729
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57743 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49730
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53623 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49731
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:61416 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49732
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65196 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49733
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58708 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49734
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59581 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49735
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53049 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49736
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60088 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49737
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:63562 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49738
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53428 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49739
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65511 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49740
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59820 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49741
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64595 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49742
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52079 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49743
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64823 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49744
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:51992 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49745
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58119 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49746
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49166 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49747
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58301 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49748
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:63446 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49749
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49874 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49750
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65459 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49751
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65385 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49752
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:54153 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49753
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64602 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49754
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:50784 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49755
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64121 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49756
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64967 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49757
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60825 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49758
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49201 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49759
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: http://sempersim.su/gm11/fre.php
            Source: Joe Sandbox ViewASN Name: SELECTELRU SELECTELRU
            Source: Joe Sandbox ViewIP Address: 95.213.216.202 95.213.216.202
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000003.00000002.506023871.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gm11/fre.php
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: unknownDNS traffic detected: queries for: sempersim.su

            System Summary

            barindex
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAC164
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAE5B0
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAE5A0
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000000.239185933.00000000004A6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemyHA.exeJ vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.265282526.0000000007150000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exeBinary or memory string: OriginalFilenamemyHA.exeJ vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: INV.2022LB0362 FORM CO (2).exeReversingLabs: Detection: 70%
            Source: INV.2022LB0362 FORM CO (2).exeVirustotal: Detection: 56%
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: unknownProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INV.2022LB0362 FORM CO (2).exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@61/1
            Source: INV.2022LB0362 FORM CO (2).exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dll
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTR
            Source: INV.2022LB0362 FORM CO (2).exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.INV.2022LB0362 FORM CO (2).exe.3d0000.0.unpack, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: 0xDBD76B81 [Sat Nov 16 23:34:25 2086 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.568253289628953
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOX

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6096Thread sleep time: -42186s >= -30000s
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6068Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6128Thread sleep time: -480000s >= -30000s
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information queried: ProcessInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 42186
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 922337203685477
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 60000
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeMemory allocated: page read and write | page guard
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000003.00000002.506514782.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath Interception11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Credentials in Registry
            1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth2
            Non-Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Data from Local System
            Automated Exfiltration112
            Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Process Injection
            NTDS1
            Remote System Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets13
            System Information Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common12
            Software Packing
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Timestomp
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            INV.2022LB0362 FORM CO (2).exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            INV.2022LB0362 FORM CO (2).exe56%VirustotalBrowse
            INV.2022LB0362 FORM CO (2).exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            SourceDetectionScannerLabelLink
            sempersim.su25%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
            http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://alphastand.top/alien/fre.php0%URL Reputationsafe
            http://www.ibsensoftware.com/0%URL Reputationsafe
            http://www.ibsensoftware.com/0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://alphastand.win/alien/fre.php0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://alphastand.trade/alien/fre.php0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://sempersim.su/gm11/fre.php25%VirustotalBrowse
            http://sempersim.su/gm11/fre.php100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            sempersim.su
            95.213.216.202
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://kbfvzoboss.bid/alien/fre.phptrue
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://alphastand.top/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://alphastand.win/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://alphastand.trade/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://sempersim.su/gm11/fre.phptrue
            • 25%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersGINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.ibsensoftware.com/INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fonts.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                95.213.216.202
                                sempersim.suRussian Federation
                                49505SELECTELRUtrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:756310
                                Start date and time:2022-11-30 00:53:06 +01:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 5m 33s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:INV.2022LB0362 FORM CO (2).exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:15
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@7/3@61/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • HTTP Packets have been reduced
                                • TCP Packets have been reduced to 100
                                • Excluded IPs from analysis (whitelisted): 8.238.190.126, 8.241.126.249, 8.241.121.126, 8.253.204.249, 8.253.204.120
                                • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                00:54:02API Interceptor59x Sleep call for process: INV.2022LB0362 FORM CO (2).exe modified
                                No context
                                No context
                                No context
                                No context
                                No context
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:data
                                Category:dropped
                                Size (bytes):46
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:D898504A722BFF1524134C6AB6A5EAA5
                                SHA1:E0FDC90C2CA2A0219C99D2758E68C18875A3E11E
                                SHA-256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
                                SHA-512:26A4398BFFB0C0AEF9A6EC53CD3367A2D0ABF2F70097F711BBBF1E9E32FD9F1A72121691BB6A39EEB55D596EDD527934E541B4DEFB3B1426B1D1A6429804DC61
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:..............................................
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.565543571702018
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:INV.2022LB0362 FORM CO (2).exe
                                File size:865280
                                MD5:baed30aea51e6000571219633aa745b0
                                SHA1:d7e3b155c00245a7f867dd2fb4c06cb7be6ec3f7
                                SHA256:57520e51bb0820741b7883926800223886c491a8a5ddd517a49b0e2cc752fb18
                                SHA512:4f19e423fc1bdbba152a570e5382bd2eabdf04ca335cdc1ed286287740c153c7a34d3a661abaf01f124870f9bd3de2e9321e66114f5bedea16131bd77de2b786
                                SSDEEP:24576:GM+L74mBfNUstzoB1ERZcSMI2PmVl9kiYxM9aE3r8JN:F+RiSMHmgu9HI
                                TLSH:91054A4F2B7FDEF0EA245CFB221457039D3651DABA8BCA7883984BC660F161C5B74864
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k................0..*..........vH... ...`....@.. ....................................@................................
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x4d4876
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xDBD76B81 [Sat Nov 16 23:34:25 2086 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd48240x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x5cc.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xd80000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xd48080x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xd287c0xd2a00False0.8132742952522255data7.568253289628953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xd60000x5cc0x600False0.4264322916666667data4.114856973981248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xd80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0xd60900x33cdata
                                RT_MANIFEST0xd63dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.395.213.216.20249705802024318 11/30/22-00:54:20.168790TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802021641 11/30/22-00:54:14.871390TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802024313 11/30/22-00:55:23.450513TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802825766 11/30/22-00:55:16.065951TCP2825766ETPRO TROJAN LokiBot Checkin M24973480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497272025483 11/30/22-00:55:04.982566TCP2025483ET TROJAN LokiBot Fake 404 Response804972795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249741802024313 11/30/22-00:55:29.247109TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802825766 11/30/22-00:54:12.581436TCP2825766ETPRO TROJAN LokiBot Checkin M24970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802025381 11/30/22-00:55:43.976237TCP2025381ET TROJAN LokiBot Checkin4974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802825766 11/30/22-00:56:01.042444TCP2825766ETPRO TROJAN LokiBot Checkin M24975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802024318 11/30/22-00:55:23.450513TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249735802021641 11/30/22-00:55:17.863854TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802024313 11/30/22-00:54:20.168790TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802024318 11/30/22-00:55:29.247109TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497232025483 11/30/22-00:54:57.894669TCP2025483ET TROJAN LokiBot Fake 404 Response804972395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249752802025381 11/30/22-00:55:49.378987TCP2025381ET TROJAN LokiBot Checkin4975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802025381 11/30/22-00:54:43.829219TCP2025381ET TROJAN LokiBot Checkin4971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802021641 11/30/22-00:54:24.716724TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802025381 11/30/22-00:55:58.948901TCP2025381ET TROJAN LokiBot Checkin4975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802021641 11/30/22-00:55:08.823725TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.395.213.216.202
                                192.168.2.38.8.8.861416532014169 11/30/22-00:55:12.379224UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6141653192.168.2.38.8.8.8
                                192.168.2.38.8.8.860088532014169 11/30/22-00:55:21.529314UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6008853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249713802024313 11/30/22-00:54:37.979213TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802825766 11/30/22-00:55:01.673863TCP2825766ETPRO TROJAN LokiBot Checkin M24972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802024318 11/30/22-00:54:37.979213TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857743532014169 11/30/22-00:55:08.735474UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5774353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802825766 11/30/22-00:55:53.496270TCP2825766ETPRO TROJAN LokiBot Checkin M24975480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497572025483 11/30/22-00:55:59.773200TCP2025483ET TROJAN LokiBot Fake 404 Response804975795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249744802025381 11/30/22-00:55:34.401351TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.395.213.216.202
                                192.168.2.38.8.8.859820532014169 11/30/22-00:55:29.162121UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5982053192.168.2.38.8.8.8
                                192.168.2.38.8.8.853305532014169 11/30/22-00:54:54.648302UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5330553192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497532025483 11/30/22-00:55:52.887247TCP2025483ET TROJAN LokiBot Fake 404 Response804975395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249708802025381 11/30/22-00:54:26.803652TCP2025381ET TROJAN LokiBot Checkin4970880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497162025483 11/30/22-00:54:45.204539TCP2025483ET TROJAN LokiBot Fake 404 Response804971695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497382025483 11/30/22-00:55:24.982216TCP2025483ET TROJAN LokiBot Fake 404 Response804973895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249758802024313 11/30/22-00:56:00.034214TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802021641 11/30/22-00:55:55.653974TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497302025483 11/30/22-00:55:10.337695TCP2025483ET TROJAN LokiBot Fake 404 Response804973095.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497342025483 11/30/22-00:55:17.565495TCP2025483ET TROJAN LokiBot Fake 404 Response804973495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249758802024318 11/30/22-00:56:00.034214TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975880192.168.2.395.213.216.202
                                192.168.2.38.8.8.852387532014169 11/30/22-00:54:14.412323UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5238753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802024318 11/30/22-00:54:53.572062TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802021641 11/30/22-00:55:03.486766TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802021641 11/30/22-00:55:45.758418TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497122025483 11/30/22-00:54:37.552263TCP2025483ET TROJAN LokiBot Fake 404 Response804971295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249718802825766 11/30/22-00:54:47.592007TCP2825766ETPRO TROJAN LokiBot Checkin M24971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.851992532014169 11/30/22-00:55:36.286012UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5199253192.168.2.38.8.8.8
                                192.168.2.38.8.8.860625532014169 11/30/22-00:54:18.863516UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6062553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802025381 11/30/22-00:55:19.643476TCP2025381ET TROJAN LokiBot Checkin4973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249721802024313 11/30/22-00:54:53.572062TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802825766 11/30/22-00:55:38.275174TCP2825766ETPRO TROJAN LokiBot Checkin M24974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802021641 11/30/22-00:54:54.732179TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802025381 11/30/22-00:54:07.324934TCP2025381ET TROJAN LokiBot Checkin4969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802021641 11/30/22-00:54:39.977728TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497492025483 11/30/22-00:55:45.483574TCP2025483ET TROJAN LokiBot Fake 404 Response804974995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249712802025381 11/30/22-00:54:35.972913TCP2025381ET TROJAN LokiBot Checkin4971280192.168.2.395.213.216.202
                                192.168.2.38.8.8.857840532014169 11/30/22-00:54:09.401173UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5784053192.168.2.38.8.8.8
                                192.168.2.38.8.8.858301532014169 11/30/22-00:55:42.001541UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5830153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802025381 11/30/22-00:55:27.193434TCP2025381ET TROJAN LokiBot Checkin4974080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497422025483 11/30/22-00:55:32.668199TCP2025483ET TROJAN LokiBot Fake 404 Response804974295.213.216.202192.168.2.3
                                192.168.2.38.8.8.863562532014169 11/30/22-00:55:23.368358UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6356253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497412025483 11/30/22-00:55:30.821604TCP2025483ET TROJAN LokiBot Fake 404 Response804974195.213.216.202192.168.2.3
                                192.168.2.38.8.8.850784532014169 11/30/22-00:55:55.557056UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5078453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249723802021641 11/30/22-00:54:56.463103TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802825766 11/30/22-00:54:37.979213TCP2825766ETPRO TROJAN LokiBot Checkin M24971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802024313 11/30/22-00:55:01.673863TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802025381 11/30/22-00:55:05.285201TCP2025381ET TROJAN LokiBot Checkin4972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802024318 11/30/22-00:55:01.673863TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802025381 11/30/22-00:55:21.614296TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497112025483 11/30/22-00:54:35.462242TCP2025483ET TROJAN LokiBot Fake 404 Response804971195.213.216.202192.168.2.3
                                192.168.2.38.8.8.856949532014169 11/30/22-00:54:59.841953UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5694953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249753802024318 11/30/22-00:55:51.242717TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802024313 11/30/22-00:55:51.242717TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975380192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497082025483 11/30/22-00:54:28.382639TCP2025483ET TROJAN LokiBot Fake 404 Response804970895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249714802825766 11/30/22-00:54:39.977728TCP2825766ETPRO TROJAN LokiBot Checkin M24971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802024313 11/30/22-00:54:59.930841TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802025381 11/30/22-00:55:57.533680TCP2025381ET TROJAN LokiBot Checkin4975680192.168.2.395.213.216.202
                                192.168.2.38.8.8.860825532014169 11/30/22-00:55:59.940841UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6082553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802024313 11/30/22-00:55:53.496270TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802021641 11/30/22-00:55:42.098367TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802024318 11/30/22-00:54:59.930841TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802021641 11/30/22-00:55:31.101064TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802825766 11/30/22-00:55:55.653974TCP2825766ETPRO TROJAN LokiBot Checkin M24975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249754802024318 11/30/22-00:55:53.496270TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802025381 11/30/22-00:54:29.164231TCP2025381ET TROJAN LokiBot Checkin4970980192.168.2.395.213.216.202
                                192.168.2.38.8.8.849977532014169 11/30/22-00:54:06.875981UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4997753192.168.2.38.8.8.8
                                192.168.2.38.8.8.856924532014169 11/30/22-00:54:16.879287UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5692453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249700802024317 11/30/22-00:54:09.487691TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249739802825766 11/30/22-00:55:25.267085TCP2825766ETPRO TROJAN LokiBot Checkin M24973980192.168.2.395.213.216.202
                                192.168.2.38.8.8.860582532014169 11/30/22-00:54:28.778637UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6058253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497192025483 11/30/22-00:54:51.280995TCP2025483ET TROJAN LokiBot Fake 404 Response804971995.213.216.202192.168.2.3
                                192.168.2.38.8.8.864595532014169 11/30/22-00:55:31.020256UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6459553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249742802825766 11/30/22-00:55:31.101064TCP2825766ETPRO TROJAN LokiBot Checkin M24974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802024312 11/30/22-00:54:09.487691TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802025381 11/30/22-00:54:33.859062TCP2025381ET TROJAN LokiBot Checkin4971180192.168.2.395.213.216.202
                                192.168.2.38.8.8.860767532014169 11/30/22-00:54:45.460012UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6076753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249739802021641 11/30/22-00:55:25.267085TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802025381 11/30/22-00:54:58.184483TCP2025381ET TROJAN LokiBot Checkin4972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802021641 11/30/22-00:55:47.279515TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249758802825766 11/30/22-00:56:00.034214TCP2825766ETPRO TROJAN LokiBot Checkin M24975880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802021641 11/30/22-00:54:31.910937TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802021641 11/30/22-00:54:33.859062TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971180192.168.2.395.213.216.202
                                192.168.2.38.8.8.849201532014169 11/30/22-00:56:00.958664UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4920153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249729802024313 11/30/22-00:55:07.068054TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249758802025381 11/30/22-00:56:00.034214TCP2025381ET TROJAN LokiBot Checkin4975880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497262025483 11/30/22-00:55:03.204141TCP2025483ET TROJAN LokiBot Fake 404 Response804972695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249743802025381 11/30/22-00:55:32.962709TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802024318 11/30/22-00:55:07.068054TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249744802021641 11/30/22-00:55:34.401351TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802021641 11/30/22-00:55:01.673863TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802024313 11/30/22-00:55:45.758418TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802825766 11/30/22-00:54:31.910937TCP2825766ETPRO TROJAN LokiBot Checkin M24971080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497222025483 11/30/22-00:54:56.166551TCP2025483ET TROJAN LokiBot Fake 404 Response804972295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249750802024318 11/30/22-00:55:45.758418TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802021641 11/30/22-00:54:07.324934TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497202025483 11/30/22-00:54:53.259308TCP2025483ET TROJAN LokiBot Fake 404 Response804972095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249701802021641 11/30/22-00:54:12.581436TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970180192.168.2.395.213.216.202
                                192.168.2.38.8.8.853623532014169 11/30/22-00:55:10.547934UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5362353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802021641 11/30/22-00:55:53.496270TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802025381 11/30/22-00:54:42.060768TCP2025381ET TROJAN LokiBot Checkin4971580192.168.2.395.213.216.202
                                192.168.2.38.8.8.852955532014169 11/30/22-00:54:26.705694UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5295553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802024313 11/30/22-00:55:27.193434TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249740802024318 11/30/22-00:55:27.193434TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802025381 11/30/22-00:55:23.450513TCP2025381ET TROJAN LokiBot Checkin4973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249731802021641 11/30/22-00:55:10.632751TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802021641 11/30/22-00:55:49.378987TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802021641 11/30/22-00:54:16.960834TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802024313 11/30/22-00:54:35.972913TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802825766 11/30/22-00:55:03.486766TCP2825766ETPRO TROJAN LokiBot Checkin M24972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802025381 11/30/22-00:54:45.540558TCP2025381ET TROJAN LokiBot Checkin4971780192.168.2.395.213.216.202
                                192.168.2.38.8.8.859581532014169 11/30/22-00:55:17.784201UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5958153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249712802024318 11/30/22-00:54:35.972913TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971280192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497312025483 11/30/22-00:55:12.166821TCP2025483ET TROJAN LokiBot Fake 404 Response804973195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249739802024313 11/30/22-00:55:25.267085TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802025381 11/30/22-00:54:59.930841TCP2025381ET TROJAN LokiBot Checkin4972580192.168.2.395.213.216.202
                                192.168.2.38.8.8.849166532014169 11/30/22-00:55:40.126118UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4916653192.168.2.38.8.8.8
                                192.168.2.38.8.8.860749532014169 11/30/22-00:54:58.103973UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6074953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497052025483 11/30/22-00:54:21.783216TCP2025483ET TROJAN LokiBot Fake 404 Response804970595.213.216.202192.168.2.3
                                192.168.2.38.8.8.853975532014169 11/30/22-00:54:22.160619UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5397553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249753802025381 11/30/22-00:55:51.242717TCP2025381ET TROJAN LokiBot Checkin4975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802021641 11/30/22-00:55:58.948901TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802021641 11/30/22-00:54:43.829219TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249739802024318 11/30/22-00:55:25.267085TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802825766 11/30/22-00:55:29.247109TCP2825766ETPRO TROJAN LokiBot Checkin M24974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802825766 11/30/22-00:54:09.487691TCP2825766ETPRO TROJAN LokiBot Checkin M24970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802024313 11/30/22-00:54:51.608521TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802024318 11/30/22-00:54:26.803652TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497482025483 11/30/22-00:55:43.661913TCP2025483ET TROJAN LokiBot Fake 404 Response804974895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249731802825766 11/30/22-00:55:10.632751TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802024313 11/30/22-00:54:14.871390TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802024318 11/30/22-00:54:51.608521TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802825766 11/30/22-00:55:21.614296TCP2825766ETPRO TROJAN LokiBot Checkin M24973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802024318 11/30/22-00:54:14.871390TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802825766 11/30/22-00:54:49.641508TCP2825766ETPRO TROJAN LokiBot Checkin M24971980192.168.2.395.213.216.202
                                192.168.2.38.8.8.863446532014169 11/30/22-00:55:43.898414UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6344653192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497092025483 11/30/22-00:54:30.691043TCP2025483ET TROJAN LokiBot Fake 404 Response804970995.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497432025483 11/30/22-00:55:34.122250TCP2025483ET TROJAN LokiBot Fake 404 Response804974395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249708802024313 11/30/22-00:54:26.803652TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970880192.168.2.395.213.216.202
                                192.168.2.38.8.8.858119532014169 11/30/22-00:55:38.197046UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5811953192.168.2.38.8.8.8
                                192.168.2.38.8.8.857990532014169 11/30/22-00:54:11.706174UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5799053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249759802024318 11/30/22-00:56:01.042444TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802825766 11/30/22-00:54:29.164231TCP2825766ETPRO TROJAN LokiBot Checkin M24970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802024313 11/30/22-00:55:08.823725TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802025381 11/30/22-00:55:36.377571TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802021641 11/30/22-00:54:58.184483TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802024313 11/30/22-00:56:01.042444TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802825766 11/30/22-00:54:16.960834TCP2825766ETPRO TROJAN LokiBot Checkin M24970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802025381 11/30/22-00:54:18.966132TCP2025381ET TROJAN LokiBot Checkin4970480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497152025483 11/30/22-00:54:43.541337TCP2025483ET TROJAN LokiBot Fake 404 Response804971595.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249730802024318 11/30/22-00:55:08.823725TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802024318 11/30/22-00:54:47.592007TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.864121532014169 11/30/22-00:55:57.444180UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6412153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249719802021641 11/30/22-00:54:49.641508TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249721802825766 11/30/22-00:54:53.572062TCP2825766ETPRO TROJAN LokiBot Checkin M24972180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497042025483 11/30/22-00:54:19.714505TCP2025483ET TROJAN LokiBot Fake 404 Response804970495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249747802021641 11/30/22-00:55:40.214633TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974780192.168.2.395.213.216.202
                                192.168.2.38.8.8.849874532014169 11/30/22-00:55:45.675021UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4987453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249722802025381 11/30/22-00:54:54.732179TCP2025381ET TROJAN LokiBot Checkin4972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802024313 11/30/22-00:54:47.592007TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.853428532014169 11/30/22-00:55:25.189214UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5342853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802024318 11/30/22-00:55:19.643476TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249736802024313 11/30/22-00:55:19.643476TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802025381 11/30/22-00:55:12.457821TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497592025483 11/30/22-00:56:01.793951TCP2025483ET TROJAN LokiBot Fake 404 Response804975995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249746802024318 11/30/22-00:55:38.275174TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802024318 11/30/22-00:55:43.976237TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802021641 11/30/22-00:55:21.614296TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802024313 11/30/22-00:55:38.275174TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497542025483 11/30/22-00:55:55.161061TCP2025483ET TROJAN LokiBot Fake 404 Response804975495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249735802025381 11/30/22-00:55:17.863854TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802021641 11/30/22-00:54:22.484255TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802021641 11/30/22-00:55:16.065951TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802825766 11/30/22-00:54:07.324934TCP2825766ETPRO TROJAN LokiBot Checkin M24969980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497322025483 11/30/22-00:55:13.950022TCP2025483ET TROJAN LokiBot Fake 404 Response804973295.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497372025483 11/30/22-00:55:23.147009TCP2025483ET TROJAN LokiBot Fake 404 Response804973795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249749802024313 11/30/22-00:55:43.976237TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802025381 11/30/22-00:55:42.098367TCP2025381ET TROJAN LokiBot Checkin4974880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497212025483 11/30/22-00:54:54.418787TCP2025483ET TROJAN LokiBot Fake 404 Response804972195.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497102025483 11/30/22-00:54:33.459515TCP2025483ET TROJAN LokiBot Fake 404 Response804971095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249733802024313 11/30/22-00:55:14.244291TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802025381 11/30/22-00:54:24.716724TCP2025381ET TROJAN LokiBot Checkin4970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802024318 11/30/22-00:55:14.244291TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.395.213.216.202
                                192.168.2.38.8.8.851139532014169 11/30/22-00:54:24.370686UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5113953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802021641 11/30/22-00:54:53.572062TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802825766 11/30/22-00:55:40.214633TCP2825766ETPRO TROJAN LokiBot Checkin M24974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802825766 11/30/22-00:54:22.484255TCP2825766ETPRO TROJAN LokiBot Checkin M24970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802021641 11/30/22-00:54:29.164231TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970980192.168.2.395.213.216.202
                                192.168.2.38.8.8.855638532014169 11/30/22-00:54:39.891168UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5563853192.168.2.38.8.8.8
                                192.168.2.38.8.8.853466532014169 11/30/22-00:55:06.970990UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5346653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249717802021641 11/30/22-00:54:45.540558TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971780192.168.2.395.213.216.202
                                192.168.2.38.8.8.864823532014169 11/30/22-00:55:34.318234UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6482353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249706802025381 11/30/22-00:54:22.484255TCP2025381ET TROJAN LokiBot Checkin4970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802825766 11/30/22-00:54:43.829219TCP2825766ETPRO TROJAN LokiBot Checkin M24971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802021641 11/30/22-00:54:51.608521TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972080192.168.2.395.213.216.202
                                192.168.2.38.8.8.865017532014169 11/30/22-00:55:05.186135UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6501753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249734802025381 11/30/22-00:55:16.065951TCP2025381ET TROJAN LokiBot Checkin4973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802024318 11/30/22-00:54:56.463103TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972380192.168.2.395.213.216.202
                                192.168.2.38.8.8.864602532014169 11/30/22-00:55:53.393350UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6460253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497252025483 11/30/22-00:55:01.390776TCP2025483ET TROJAN LokiBot Fake 404 Response804972595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497292025483 11/30/22-00:55:08.539654TCP2025483ET TROJAN LokiBot Fake 404 Response804972995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249723802024313 11/30/22-00:54:56.463103TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972380192.168.2.395.213.216.202
                                192.168.2.38.8.8.853848532014169 11/30/22-00:54:49.539403UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5384853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249744802825766 11/30/22-00:55:34.401351TCP2825766ETPRO TROJAN LokiBot Checkin M24974480192.168.2.395.213.216.202
                                192.168.2.38.8.8.865107532014169 11/30/22-00:54:47.470066UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6510753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249739802025381 11/30/22-00:55:25.267085TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802021641 11/30/22-00:54:35.972913TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802021641 11/30/22-00:55:51.242717TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802021641 11/30/22-00:54:59.930841TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802024318 11/30/22-00:55:42.098367TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249731802024313 11/30/22-00:55:10.632751TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802024313 11/30/22-00:55:42.098367TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974880192.168.2.395.213.216.202
                                192.168.2.38.8.8.865196532014169 11/30/22-00:55:14.166464UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6519653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249731802024318 11/30/22-00:55:10.632751TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802825766 11/30/22-00:54:26.803652TCP2825766ETPRO TROJAN LokiBot Checkin M24970880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802825766 11/30/22-00:55:43.976237TCP2825766ETPRO TROJAN LokiBot Checkin M24974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802024313 11/30/22-00:55:32.962709TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802825766 11/30/22-00:55:58.948901TCP2825766ETPRO TROJAN LokiBot Checkin M24975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802024318 11/30/22-00:55:32.962709TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802024318 11/30/22-00:55:05.285201TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802025381 11/30/22-00:55:45.758418TCP2025381ET TROJAN LokiBot Checkin4975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802021641 11/30/22-00:54:09.487691TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802024313 11/30/22-00:55:05.285201TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802025381 11/30/22-00:54:39.977728TCP2025381ET TROJAN LokiBot Checkin4971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802825766 11/30/22-00:54:58.184483TCP2825766ETPRO TROJAN LokiBot Checkin M24972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802025381 11/30/22-00:54:49.641508TCP2025381ET TROJAN LokiBot Checkin4971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802024318 11/30/22-00:55:57.533680TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802025381 11/30/22-00:55:31.101064TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802021641 11/30/22-00:55:14.244291TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802825766 11/30/22-00:55:07.068054TCP2825766ETPRO TROJAN LokiBot Checkin M24972980192.168.2.395.213.216.202
                                192.168.2.38.8.8.857704532014169 11/30/22-00:54:41.979608UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5770453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249715802024318 11/30/22-00:54:42.060768TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802825766 11/30/22-00:55:49.378987TCP2825766ETPRO TROJAN LokiBot Checkin M24975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802024313 11/30/22-00:55:57.533680TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802024313 11/30/22-00:54:42.060768TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802024313 11/30/22-00:55:47.279515TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802825766 11/30/22-00:54:33.859062TCP2825766ETPRO TROJAN LokiBot Checkin M24971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802024318 11/30/22-00:55:47.279515TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802024318 11/30/22-00:54:31.910937TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802024313 11/30/22-00:54:31.910937TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802025381 11/30/22-00:55:40.214633TCP2025381ET TROJAN LokiBot Checkin4974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802025381 11/30/22-00:54:12.581436TCP2025381ET TROJAN LokiBot Checkin4970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802025381 11/30/22-00:55:55.653974TCP2025381ET TROJAN LokiBot Checkin4975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802021641 11/30/22-00:55:07.068054TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497442025483 11/30/22-00:55:36.086250TCP2025483ET TROJAN LokiBot Fake 404 Response804974495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249735802024318 11/30/22-00:55:17.863854TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973580192.168.2.395.213.216.202
                                192.168.2.38.8.8.853049532014169 11/30/22-00:55:19.563471UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5304953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249735802024313 11/30/22-00:55:17.863854TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249744802024313 11/30/22-00:55:34.401351TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497472025483 11/30/22-00:55:41.771804TCP2025483ET TROJAN LokiBot Fake 404 Response804974795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249744802024318 11/30/22-00:55:34.401351TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802021641 11/30/22-00:55:29.247109TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802825766 11/30/22-00:54:18.966132TCP2825766ETPRO TROJAN LokiBot Checkin M24970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802025381 11/30/22-00:55:38.275174TCP2025381ET TROJAN LokiBot Checkin4974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802021641 11/30/22-00:55:12.457821TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802024312 11/30/22-00:54:07.324934TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802024313 11/30/22-00:54:24.716724TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497062025483 11/30/22-00:54:24.053489TCP2025483ET TROJAN LokiBot Fake 404 Response804970695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497502025483 11/30/22-00:55:46.963833TCP2025483ET TROJAN LokiBot Fake 404 Response804975095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249699802024317 11/30/22-00:54:07.324934TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802025381 11/30/22-00:55:03.486766TCP2025381ET TROJAN LokiBot Checkin4972780192.168.2.395.213.216.202
                                192.168.2.38.8.8.865511532014169 11/30/22-00:55:27.103034UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6551153192.168.2.38.8.8.8
                                192.168.2.38.8.8.864967532014169 11/30/22-00:55:58.869049UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6496753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802025381 11/30/22-00:54:53.572062TCP2025381ET TROJAN LokiBot Checkin4972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802024318 11/30/22-00:54:24.716724TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802021641 11/30/22-00:54:37.979213TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802825766 11/30/22-00:55:12.457821TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802825766 11/30/22-00:55:47.279515TCP2825766ETPRO TROJAN LokiBot Checkin M24975180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497552025483 11/30/22-00:55:57.270722TCP2025483ET TROJAN LokiBot Fake 404 Response804975595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497582025483 11/30/22-00:56:00.797031TCP2025483ET TROJAN LokiBot Fake 404 Response804975895.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497362025483 11/30/22-00:55:21.118367TCP2025483ET TROJAN LokiBot Fake 404 Response804973695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249703802024318 11/30/22-00:54:16.960834TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802025381 11/30/22-00:54:14.871390TCP2025381ET TROJAN LokiBot Checkin4970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802024313 11/30/22-00:54:16.960834TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857134532014169 11/30/22-00:54:31.820802UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5713453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249758802021641 11/30/22-00:56:00.034214TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975880192.168.2.395.213.216.202
                                192.168.2.38.8.8.858691532014169 11/30/22-00:54:53.455722UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5869153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802825766 11/30/22-00:55:19.643476TCP2825766ETPRO TROJAN LokiBot Checkin M24973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802025381 11/30/22-00:54:20.168790TCP2025381ET TROJAN LokiBot Checkin4970580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497332025483 11/30/22-00:55:15.751744TCP2025483ET TROJAN LokiBot Fake 404 Response804973395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249745802825766 11/30/22-00:55:36.377571TCP2825766ETPRO TROJAN LokiBot Checkin M24974580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497032025483 11/30/22-00:54:18.541620TCP2025483ET TROJAN LokiBot Fake 404 Response804970395.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497142025483 11/30/22-00:54:41.602416TCP2025483ET TROJAN LokiBot Fake 404 Response804971495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249716802024313 11/30/22-00:54:43.829219TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971680192.168.2.395.213.216.202
                                192.168.2.38.8.8.859433532014169 11/30/22-00:54:56.376062UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5943353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249757802024313 11/30/22-00:55:58.948901TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802825766 11/30/22-00:54:45.540558TCP2825766ETPRO TROJAN LokiBot Checkin M24971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802024313 11/30/22-00:54:54.732179TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802024318 11/30/22-00:54:43.829219TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802025381 11/30/22-00:56:01.042444TCP2025381ET TROJAN LokiBot Checkin4975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802024318 11/30/22-00:55:58.948901TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802825766 11/30/22-00:54:56.463103TCP2825766ETPRO TROJAN LokiBot Checkin M24972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802025381 11/30/22-00:54:47.592007TCP2025381ET TROJAN LokiBot Checkin4971880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802025381 11/30/22-00:55:08.823725TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802021641 11/30/22-00:54:18.966132TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802024318 11/30/22-00:54:54.732179TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802021641 11/30/22-00:55:36.377571TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802024313 11/30/22-00:54:39.977728TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802825766 11/30/22-00:54:59.930841TCP2825766ETPRO TROJAN LokiBot Checkin M24972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802025381 11/30/22-00:54:09.487691TCP2025381ET TROJAN LokiBot Checkin4970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802024318 11/30/22-00:54:39.977728TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971480192.168.2.395.213.216.202
                                192.168.2.38.8.8.858708532014169 11/30/22-00:55:15.985743UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5870853192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497282025483 11/30/22-00:55:06.759571TCP2025483ET TROJAN LokiBot Fake 404 Response804972895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249732802024318 11/30/22-00:55:12.457821TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802825766 11/30/22-00:54:24.716724TCP2825766ETPRO TROJAN LokiBot Checkin M24970780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497242025483 11/30/22-00:54:59.594972TCP2025483ET TROJAN LokiBot Fake 404 Response804972495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249732802024313 11/30/22-00:55:12.457821TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802021641 11/30/22-00:54:26.803652TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802024318 11/30/22-00:54:58.184483TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802021641 11/30/22-00:56:01.042444TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802025381 11/30/22-00:55:47.279515TCP2025381ET TROJAN LokiBot Checkin4975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802024313 11/30/22-00:54:58.184483TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802025381 11/30/22-00:54:31.910937TCP2025381ET TROJAN LokiBot Checkin4971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802825766 11/30/22-00:54:42.060768TCP2825766ETPRO TROJAN LokiBot Checkin M24971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802024318 11/30/22-00:55:40.214633TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802024313 11/30/22-00:55:40.214633TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802024313 11/30/22-00:54:49.641508TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802825766 11/30/22-00:55:32.962709TCP2825766ETPRO TROJAN LokiBot Checkin M24974380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857571532014169 11/30/22-00:54:51.528645UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5757153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249719802024318 11/30/22-00:54:49.641508TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802024318 11/30/22-00:55:31.101064TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974280192.168.2.395.213.216.202
                                192.168.2.38.8.8.859636532014169 11/30/22-00:54:37.879679UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5963653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249720802825766 11/30/22-00:54:51.608521TCP2825766ETPRO TROJAN LokiBot Checkin M24972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802024313 11/30/22-00:55:31.101064TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802021641 11/30/22-00:54:47.592007TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802025381 11/30/22-00:55:14.244291TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249736802021641 11/30/22-00:55:19.643476TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802021641 11/30/22-00:55:38.275174TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802024318 11/30/22-00:55:16.065951TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802025381 11/30/22-00:54:56.463103TCP2025381ET TROJAN LokiBot Checkin4972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802825766 11/30/22-00:55:42.098367TCP2825766ETPRO TROJAN LokiBot Checkin M24974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802024313 11/30/22-00:55:21.614296TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497562025483 11/30/22-00:55:58.723099TCP2025483ET TROJAN LokiBot Fake 404 Response804975695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249702802825766 11/30/22-00:54:14.871390TCP2825766ETPRO TROJAN LokiBot Checkin M24970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802024318 11/30/22-00:55:21.614296TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802825766 11/30/22-00:55:08.823725TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802024313 11/30/22-00:54:22.484255TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802024313 11/30/22-00:55:16.065951TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497352025483 11/30/22-00:55:19.347023TCP2025483ET TROJAN LokiBot Fake 404 Response804973595.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249706802024318 11/30/22-00:54:22.484255TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497522025483 11/30/22-00:55:50.930381TCP2025483ET TROJAN LokiBot Fake 404 Response804975295.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497172025483 11/30/22-00:54:47.032787TCP2025483ET TROJAN LokiBot Fake 404 Response804971795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249733802825766 11/30/22-00:55:14.244291TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497392025483 11/30/22-00:55:26.908255TCP2025483ET TROJAN LokiBot Fake 404 Response804973995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249720802025381 11/30/22-00:54:51.608521TCP2025381ET TROJAN LokiBot Checkin4972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802021641 11/30/22-00:55:43.976237TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974980192.168.2.395.213.216.202
                                192.168.2.38.8.8.865320532014169 11/30/22-00:54:43.751689UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6532053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249735802825766 11/30/22-00:55:17.863854TCP2825766ETPRO TROJAN LokiBot Checkin M24973580192.168.2.395.213.216.202
                                192.168.2.38.8.8.852079532014169 11/30/22-00:55:32.870195UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5207953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497012025483 11/30/22-00:54:14.085146TCP2025483ET TROJAN LokiBot Fake 404 Response804970195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249731802025381 11/30/22-00:55:10.632751TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802024318 11/30/22-00:54:29.164231TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802024318 11/30/22-00:55:36.377571TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802024313 11/30/22-00:54:29.164231TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802825766 11/30/22-00:54:20.168790TCP2825766ETPRO TROJAN LokiBot Checkin M24970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802024313 11/30/22-00:55:36.377571TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802024318 11/30/22-00:54:18.966132TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802024313 11/30/22-00:54:18.966132TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802024313 11/30/22-00:54:45.540558TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802825766 11/30/22-00:54:54.732179TCP2825766ETPRO TROJAN LokiBot Checkin M24972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802025381 11/30/22-00:54:16.960834TCP2025381ET TROJAN LokiBot Checkin4970380192.168.2.395.213.216.202
                                192.168.2.38.8.8.849302532014169 11/30/22-00:54:20.078245UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4930253192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249711802024313 11/30/22-00:54:33.859062TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802825766 11/30/22-00:55:05.285201TCP2825766ETPRO TROJAN LokiBot Checkin M24972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802021641 11/30/22-00:54:20.168790TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802024318 11/30/22-00:54:33.859062TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802021641 11/30/22-00:55:23.450513TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973880192.168.2.395.213.216.202
                                192.168.2.38.8.8.865385532014169 11/30/22-00:55:49.289719UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6538553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802825766 11/30/22-00:55:27.193434TCP2825766ETPRO TROJAN LokiBot Checkin M24974080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497452025483 11/30/22-00:55:37.973570TCP2025483ET TROJAN LokiBot Fake 404 Response804974595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497462025483 11/30/22-00:55:39.906968TCP2025483ET TROJAN LokiBot Fake 404 Response804974695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497402025483 11/30/22-00:55:28.902821TCP2025483ET TROJAN LokiBot Fake 404 Response804974095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249717802024318 11/30/22-00:54:45.540558TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802024313 11/30/22-00:54:12.581436TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802825766 11/30/22-00:55:23.450513TCP2825766ETPRO TROJAN LokiBot Checkin M24973880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497132025483 11/30/22-00:54:39.587400TCP2025483ET TROJAN LokiBot Fake 404 Response804971395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249701802024318 11/30/22-00:54:12.581436TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802825766 11/30/22-00:55:57.533680TCP2825766ETPRO TROJAN LokiBot Checkin M24975680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497022025483 11/30/22-00:54:16.469088TCP2025483ET TROJAN LokiBot Fake 404 Response804970295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249750802825766 11/30/22-00:55:45.758418TCP2825766ETPRO TROJAN LokiBot Checkin M24975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802021641 11/30/22-00:55:32.962709TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249740802021641 11/30/22-00:55:27.193434TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802025381 11/30/22-00:55:07.068054TCP2025381ET TROJAN LokiBot Checkin4972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802024313 11/30/22-00:55:49.378987TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802025381 11/30/22-00:55:29.247109TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802025381 11/30/22-00:55:01.673863TCP2025381ET TROJAN LokiBot Checkin4972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802024318 11/30/22-00:55:49.378987TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975280192.168.2.395.213.216.202
                                192.168.2.38.8.8.856042532014169 11/30/22-00:54:35.894646UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5604253192.168.2.38.8.8.8
                                192.168.2.38.8.8.853844532014169 11/30/22-00:55:03.396283UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5384453192.168.2.38.8.8.8
                                192.168.2.38.8.8.862050532014169 11/30/22-00:54:33.763792UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6205053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249728802021641 11/30/22-00:55:05.285201TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497512025483 11/30/22-00:55:49.068855TCP2025483ET TROJAN LokiBot Fake 404 Response804975195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249755802024318 11/30/22-00:55:55.653974TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497182025483 11/30/22-00:54:49.052316TCP2025483ET TROJAN LokiBot Fake 404 Response804971895.213.216.202192.168.2.3
                                192.168.2.38.8.8.852547532014169 11/30/22-00:55:01.596754UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5254753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249755802024313 11/30/22-00:55:55.653974TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802024318 11/30/22-00:55:03.486766TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802025381 11/30/22-00:54:37.979213TCP2025381ET TROJAN LokiBot Checkin4971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802021641 11/30/22-00:55:57.533680TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975680192.168.2.395.213.216.202
                                192.168.2.38.8.8.865459532014169 11/30/22-00:55:47.178193UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6545953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497072025483 11/30/22-00:54:26.372322TCP2025483ET TROJAN LokiBot Fake 404 Response804970795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249715802021641 11/30/22-00:54:42.060768TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802825766 11/30/22-00:54:35.972913TCP2825766ETPRO TROJAN LokiBot Checkin M24971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802825766 11/30/22-00:55:51.242717TCP2825766ETPRO TROJAN LokiBot Checkin M24975380192.168.2.395.213.216.202
                                192.168.2.38.8.8.854153532014169 11/30/22-00:55:51.152832UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5415353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802025381 11/30/22-00:55:53.496270TCP2025381ET TROJAN LokiBot Checkin4975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802024313 11/30/22-00:55:03.486766TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972780192.168.2.395.213.216.202
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 30, 2022 00:54:07.252681971 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.317872047 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:07.318666935 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.324934006 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.390002012 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:07.390280008 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.454189062 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:08.932713032 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:08.932929993 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:08.932929993 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:08.997078896 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.427567959 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.484437943 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.484872103 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.487690926 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.545456886 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.545732975 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.602526903 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:11.058943987 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:11.059271097 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:11.251259089 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:11.308391094 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.515145063 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.578533888 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.578650951 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.581435919 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.644690037 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.644942999 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.708281040 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.085145950 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.085324049 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.085324049 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.148653984 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.796390057 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.863887072 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.864324093 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.871390104 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.938833952 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.939245939 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:15.006510973 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.469088078 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.469213009 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.469305038 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.536587954 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.901004076 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.957978010 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.958115101 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.960834026 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:17.017646074 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:17.017842054 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:17.074562073 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.541620016 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.541914940 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.541914940 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.598728895 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.898685932 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.963310003 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.963515997 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.966131926 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.030903101 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.031228065 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.095748901 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.714504957 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.714649916 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.722553015 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.787149906 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.097837925 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.161624908 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.161886930 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.168790102 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.232583046 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.232693911 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.296284914 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:21.783216000 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:21.783595085 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:21.783595085 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:21.847395897 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.417725086 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.481591940 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.481817961 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.484255075 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.547919989 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.548185110 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.611813068 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.053488970 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.053700924 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.053700924 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.117465019 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.644469023 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.708810091 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.709328890 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.716723919 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.780909061 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.781121969 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.845062971 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.372322083 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.372553110 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.372901917 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.436924934 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.735404968 CET4970880192.168.2.395.213.216.202
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 30, 2022 00:54:06.875981092 CET4997753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:07.240958929 CET53499778.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:09.401173115 CET5784053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:09.420834064 CET53578408.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:11.706173897 CET5799053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:12.468837023 CET53579908.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:14.412322998 CET5238753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:14.780765057 CET53523878.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:16.879287004 CET5692453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:16.898757935 CET53569248.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:18.863516092 CET6062553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:18.881309032 CET53606258.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:20.078244925 CET4930253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:20.096685886 CET53493028.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:22.160619020 CET5397553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:22.415709972 CET53539758.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:24.370686054 CET5113953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:24.639362097 CET53511398.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:26.705693960 CET5295553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:26.723373890 CET53529558.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:28.778636932 CET6058253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:29.064884901 CET53605828.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:31.820801973 CET5713453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:31.840390921 CET53571348.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:33.763792038 CET6205053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:33.781332970 CET53620508.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:35.894645929 CET5604253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:35.912352085 CET53560428.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:37.879678965 CET5963653192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:37.897547007 CET53596368.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:39.891168118 CET5563853192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:39.908864975 CET53556388.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:41.979608059 CET5770453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:41.997195005 CET53577048.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:43.751688957 CET6532053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:43.768886089 CET53653208.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:45.460011959 CET6076753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:45.479480982 CET53607678.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:47.470066071 CET6510753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:47.487802982 CET53651078.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:49.539402962 CET5384853192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:49.559163094 CET53538488.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:51.528645039 CET5757153192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:51.546144009 CET53575718.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:53.455722094 CET5869153192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:53.473742008 CET53586918.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:54.648302078 CET5330553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:54.668741941 CET53533058.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:56.376061916 CET5943353192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:56.395571947 CET53594338.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:58.103972912 CET6074953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:58.123743057 CET53607498.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:59.841953039 CET5694953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:59.861439943 CET53569498.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:01.596754074 CET5254753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:01.613591909 CET53525478.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:03.396282911 CET5384453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:03.413459063 CET53538448.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:05.186135054 CET6501753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:05.205918074 CET53650178.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:06.970989943 CET5346653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:06.988650084 CET53534668.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:08.735474110 CET5774353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:08.753017902 CET53577438.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:10.547934055 CET5362353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:10.565411091 CET53536238.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:12.379224062 CET6141653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:12.396709919 CET53614168.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:14.166464090 CET6519653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:14.183665037 CET53651968.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:15.985743046 CET5870853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:16.003206015 CET53587088.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:17.784200907 CET5958153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:17.801747084 CET53595818.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:19.563471079 CET5304953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:19.582814932 CET53530498.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:21.529314041 CET6008853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:21.547068119 CET53600888.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:23.368357897 CET6356253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:23.385291100 CET53635628.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:25.189213991 CET5342853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:25.206536055 CET53534288.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:27.103034019 CET6551153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:27.120949030 CET53655118.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:29.162121058 CET5982053192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:29.179055929 CET53598208.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:31.020256042 CET6459553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:31.039771080 CET53645958.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:32.870194912 CET5207953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:32.889683008 CET53520798.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:34.318233967 CET6482353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:34.335309029 CET53648238.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:36.286011934 CET5199253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:36.303749084 CET53519928.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:38.197046041 CET5811953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:38.214360952 CET53581198.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:40.126117945 CET4916653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:40.145720959 CET53491668.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:42.001540899 CET5830153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:42.019203901 CET53583018.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:43.898413897 CET6344653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:43.915456057 CET53634468.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:45.675020933 CET4987453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:45.694405079 CET53498748.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:47.178193092 CET6545953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:47.198072910 CET53654598.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:49.289719105 CET6538553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:49.307233095 CET53653858.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:51.152832031 CET5415353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:51.172306061 CET53541538.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:53.393349886 CET6460253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:53.412369013 CET53646028.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:55.557055950 CET5078453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:55.574852943 CET53507848.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:57.444180012 CET6412153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:57.463988066 CET53641218.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:58.869049072 CET6496753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:58.886452913 CET53649678.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:59.940840960 CET6082553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:59.957931995 CET53608258.8.8.8192.168.2.3
                                Nov 30, 2022 00:56:00.958663940 CET4920153192.168.2.38.8.8.8
                                Nov 30, 2022 00:56:00.977658987 CET53492018.8.8.8192.168.2.3
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Nov 30, 2022 00:54:06.875981092 CET192.168.2.38.8.8.80x6188Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:09.401173115 CET192.168.2.38.8.8.80x5d3bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:11.706173897 CET192.168.2.38.8.8.80xb7e8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:14.412322998 CET192.168.2.38.8.8.80x4082Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:16.879287004 CET192.168.2.38.8.8.80x22b9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:18.863516092 CET192.168.2.38.8.8.80xeaacStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:20.078244925 CET192.168.2.38.8.8.80x28fbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:22.160619020 CET192.168.2.38.8.8.80xee98Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:24.370686054 CET192.168.2.38.8.8.80x2624Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:26.705693960 CET192.168.2.38.8.8.80x5477Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:28.778636932 CET192.168.2.38.8.8.80xdeccStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:31.820801973 CET192.168.2.38.8.8.80x1c2dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:33.763792038 CET192.168.2.38.8.8.80xf2e6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:35.894645929 CET192.168.2.38.8.8.80x1fc5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:37.879678965 CET192.168.2.38.8.8.80xbadStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:39.891168118 CET192.168.2.38.8.8.80x785cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:41.979608059 CET192.168.2.38.8.8.80xabafStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:43.751688957 CET192.168.2.38.8.8.80x692bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:45.460011959 CET192.168.2.38.8.8.80x4377Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:47.470066071 CET192.168.2.38.8.8.80xbe7aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:49.539402962 CET192.168.2.38.8.8.80x9c9aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:51.528645039 CET192.168.2.38.8.8.80xb58Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:53.455722094 CET192.168.2.38.8.8.80xdac7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:54.648302078 CET192.168.2.38.8.8.80xaacdStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:56.376061916 CET192.168.2.38.8.8.80x479cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:58.103972912 CET192.168.2.38.8.8.80xea9fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:59.841953039 CET192.168.2.38.8.8.80x16e7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:01.596754074 CET192.168.2.38.8.8.80x35c4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:03.396282911 CET192.168.2.38.8.8.80x8db7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:05.186135054 CET192.168.2.38.8.8.80xa497Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:06.970989943 CET192.168.2.38.8.8.80x67dbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:08.735474110 CET192.168.2.38.8.8.80x7db5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:10.547934055 CET192.168.2.38.8.8.80x1fa1Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:12.379224062 CET192.168.2.38.8.8.80x4f02Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:14.166464090 CET192.168.2.38.8.8.80x4ab6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:15.985743046 CET192.168.2.38.8.8.80x3921Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:17.784200907 CET192.168.2.38.8.8.80xc7dcStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:19.563471079 CET192.168.2.38.8.8.80x46b9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:21.529314041 CET192.168.2.38.8.8.80x213Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:23.368357897 CET192.168.2.38.8.8.80x1d07Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:25.189213991 CET192.168.2.38.8.8.80x6e37Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:27.103034019 CET192.168.2.38.8.8.80xea01Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:29.162121058 CET192.168.2.38.8.8.80x4235Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:31.020256042 CET192.168.2.38.8.8.80xa106Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:32.870194912 CET192.168.2.38.8.8.80x86eeStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:34.318233967 CET192.168.2.38.8.8.80x2d83Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:36.286011934 CET192.168.2.38.8.8.80xbdf8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:38.197046041 CET192.168.2.38.8.8.80x23f4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:40.126117945 CET192.168.2.38.8.8.80x856eStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:42.001540899 CET192.168.2.38.8.8.80x3a49Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:43.898413897 CET192.168.2.38.8.8.80x4c7eStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:45.675020933 CET192.168.2.38.8.8.80xd354Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:47.178193092 CET192.168.2.38.8.8.80x8af6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:49.289719105 CET192.168.2.38.8.8.80xc369Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:51.152832031 CET192.168.2.38.8.8.80xe950Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:53.393349886 CET192.168.2.38.8.8.80x9913Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:55.557055950 CET192.168.2.38.8.8.80x2074Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:57.444180012 CET192.168.2.38.8.8.80x2543Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:58.869049072 CET192.168.2.38.8.8.80x92c3Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:59.940840960 CET192.168.2.38.8.8.80x3488Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:56:00.958663940 CET192.168.2.38.8.8.80x58c4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Nov 30, 2022 00:54:07.240958929 CET8.8.8.8192.168.2.30x6188No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:09.420834064 CET8.8.8.8192.168.2.30x5d3bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:12.468837023 CET8.8.8.8192.168.2.30xb7e8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:14.780765057 CET8.8.8.8192.168.2.30x4082No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:16.898757935 CET8.8.8.8192.168.2.30x22b9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:18.881309032 CET8.8.8.8192.168.2.30xeaacNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:20.096685886 CET8.8.8.8192.168.2.30x28fbNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:22.415709972 CET8.8.8.8192.168.2.30xee98No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:24.639362097 CET8.8.8.8192.168.2.30x2624No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:26.723373890 CET8.8.8.8192.168.2.30x5477No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:29.064884901 CET8.8.8.8192.168.2.30xdeccNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:31.840390921 CET8.8.8.8192.168.2.30x1c2dNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:33.781332970 CET8.8.8.8192.168.2.30xf2e6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:35.912352085 CET8.8.8.8192.168.2.30x1fc5No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:37.897547007 CET8.8.8.8192.168.2.30xbadNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:39.908864975 CET8.8.8.8192.168.2.30x785cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:41.997195005 CET8.8.8.8192.168.2.30xabafNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:43.768886089 CET8.8.8.8192.168.2.30x692bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:45.479480982 CET8.8.8.8192.168.2.30x4377No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:47.487802982 CET8.8.8.8192.168.2.30xbe7aNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:49.559163094 CET8.8.8.8192.168.2.30x9c9aNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:51.546144009 CET8.8.8.8192.168.2.30xb58No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:53.473742008 CET8.8.8.8192.168.2.30xdac7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:54.668741941 CET8.8.8.8192.168.2.30xaacdNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:56.395571947 CET8.8.8.8192.168.2.30x479cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:58.123743057 CET8.8.8.8192.168.2.30xea9fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:59.861439943 CET8.8.8.8192.168.2.30x16e7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:01.613591909 CET8.8.8.8192.168.2.30x35c4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:03.413459063 CET8.8.8.8192.168.2.30x8db7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:05.205918074 CET8.8.8.8192.168.2.30xa497No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:06.988650084 CET8.8.8.8192.168.2.30x67dbNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:08.753017902 CET8.8.8.8192.168.2.30x7db5No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:10.565411091 CET8.8.8.8192.168.2.30x1fa1No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:12.396709919 CET8.8.8.8192.168.2.30x4f02No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:14.183665037 CET8.8.8.8192.168.2.30x4ab6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:16.003206015 CET8.8.8.8192.168.2.30x3921No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:17.801747084 CET8.8.8.8192.168.2.30xc7dcNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:19.582814932 CET8.8.8.8192.168.2.30x46b9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:21.547068119 CET8.8.8.8192.168.2.30x213No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:23.385291100 CET8.8.8.8192.168.2.30x1d07No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:25.206536055 CET8.8.8.8192.168.2.30x6e37No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:27.120949030 CET8.8.8.8192.168.2.30xea01No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:29.179055929 CET8.8.8.8192.168.2.30x4235No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:31.039771080 CET8.8.8.8192.168.2.30xa106No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:32.889683008 CET8.8.8.8192.168.2.30x86eeNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:34.335309029 CET8.8.8.8192.168.2.30x2d83No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:36.303749084 CET8.8.8.8192.168.2.30xbdf8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:38.214360952 CET8.8.8.8192.168.2.30x23f4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:40.145720959 CET8.8.8.8192.168.2.30x856eNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:42.019203901 CET8.8.8.8192.168.2.30x3a49No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:43.915456057 CET8.8.8.8192.168.2.30x4c7eNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:45.694405079 CET8.8.8.8192.168.2.30xd354No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:47.198072910 CET8.8.8.8192.168.2.30x8af6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:49.307233095 CET8.8.8.8192.168.2.30xc369No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:51.172306061 CET8.8.8.8192.168.2.30xe950No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:53.412369013 CET8.8.8.8192.168.2.30x9913No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:55.574852943 CET8.8.8.8192.168.2.30x2074No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:57.463988066 CET8.8.8.8192.168.2.30x2543No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:58.886452913 CET8.8.8.8192.168.2.30x92c3No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:59.957931995 CET8.8.8.8192.168.2.30x3488No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:56:00.977658987 CET8.8.8.8192.168.2.30x58c4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                • sempersim.su

                                Click to jump to process

                                Target ID:0
                                Start time:00:53:56
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x3d0000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                Target ID:1
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x1d0000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:2
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x360000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:3
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0xc70000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000003.00000002.506514782.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                No disassembly