Edit tour
Windows
Analysis Report
EL378_SPEC.exe
Overview
General Information
Detection
GuLoader
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect Any.run
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Contains functionality to shutdown / reboot the system
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
Drops PE files
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Found evaded block containing many API calls
PE / OLE file has an invalid certificate
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard
Classification
- System is w10x64native
- EL378_SPEC.exe (PID: 7376 cmdline:
C:\Users\u ser\Deskto p\EL378_SP EC.exe MD5: 3BDBF0495A23287DDD05975E5E3B33F7) - EL378_SPEC.exe (PID: 7372 cmdline:
C:\Users\u ser\Deskto p\EL378_SP EC.exe MD5: 3BDBF0495A23287DDD05975E5E3B33F7)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00406719 | |
Source: | Code function: | 0_2_004065CF | |
Source: | Code function: | 0_2_00402B75 |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00404B30 |
Source: | Static PE information: |
Source: | Code function: | 0_2_004036FC |
Source: | Code function: | 0_2_0040441E | |
Source: | Code function: | 0_2_004075FE | |
Source: | Code function: | 0_2_00406EAE | |
Source: | Code function: | 0_2_6ECC2351 |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_004036FC |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | File read: | Jump to behavior |
Source: | Code function: | 0_2_00404085 |
Source: | Mutant created: |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Evaded block: | graph_0-4582 |
Source: | Code function: | 0_2_00406719 | |
Source: | Code function: | 0_2_004065CF | |
Source: | Code function: | 0_2_00402B75 |
Source: | API call chain: | graph_0-4469 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00403148 |
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_004036FC |
Stealing of Sensitive Information |
---|
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 1 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Email Collection | Exfiltration Over Other Network Medium | 11 Encrypted Channel | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | 1 System Shutdown/Reboot |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Virtualization/Sandbox Evasion | 1 Credentials in Registry | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | Exfiltration Over Bluetooth | 1 Ingress Tool Transfer | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | 1 DLL Side-Loading | 1 Access Token Manipulation | Security Account Manager | 2 File and Directory Discovery | SMB/Windows Admin Shares | 2 Data from Local System | Automated Exfiltration | 2 Non-Application Layer Protocol | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | 11 Process Injection | NTDS | 5 System Information Discovery | Distributed Component Object Model | 1 Clipboard Data | Scheduled Transfer | 13 Application Layer Protocol | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
41% | Virustotal | Browse | ||
21% | ReversingLabs | Win32.Trojan.Nemesis |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
drive.google.com | 142.250.186.174 | true | false | high | |
googlehosted.l.googleusercontent.com | 142.250.185.97 | true | false | high | |
doc-0s-as-docs.googleusercontent.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.174 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
142.250.185.97 | googlehosted.l.googleusercontent.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1290922 |
Start date and time: | 2023-08-14 13:00:10 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301 |
Run name: | Suspected Instruction Hammering |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | EL378_SPEC.exe |
Detection: | MAL |
Classification: | mal80.troj.spyw.evad.winEXE@3/6@2/2 |
EGA Information: |
|
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
⊘No simulations
⊘No context
⊘No context
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | GuLoader | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Djvu | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
| ||
Get hash | malicious | GuLoader, Lokibot | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Djvu, RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | SharepointPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | CobaltStrike | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsb12B3.tmp\System.dll | Get hash | malicious | GuLoader, Lokibot | Browse | ||
Get hash | malicious | GuLoader, Lokibot | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader, Remcos | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader, Lokibot | Browse | |||
Get hash | malicious | GuLoader, Lokibot | Browse | |||
Get hash | malicious | GuLoader | Browse |
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 469614 |
Entropy (8bit): | 7.035187118547805 |
Encrypted: | false |
SSDEEP: | 12288:hwSkytulU7uv1rQkaQt+9Mr7H6GNXdwu7DH:re0NI6GNXRb |
MD5: | 44CBE9C09BD96D2DF376F51F22036208 |
SHA1: | D8D1D65D37BB8059D3EC2C5D68DFD69108C9F40D |
SHA-256: | 211618A21450916039E01E1CFF4B9A392B30C8265BD0AD82C41CA17C25610E6A |
SHA-512: | 1E762C7AD6403FE23A40B15A1ED134866E5FE33C0CCDC1154AA5E35B2BA484643958E2C55EE34DED2D5C8047EDA4899BF4B74EC9C39F49E03E79725FB3928B09 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4347 |
Entropy (8bit): | 7.958125070410311 |
Encrypted: | false |
SSDEEP: | 96:pRxzSspJCkWj+jua+BXLnBxsC6no5sc+ih852:hSYajra+RLBxsZno5sct8I |
MD5: | 3ED32E9228C60D2E5BCFC01D5B4192DA |
SHA1: | E815A4710B028FD80F66ED890DD6287B04A96DE0 |
SHA-256: | 801E379112870B55147DB5E678F1EB70DC88C983E4A6F52853F12240ED9501D2 |
SHA-512: | 188EFCD34B5FFBC1C361E5A22AE283E73D7F27D54F4DC651E0BD06BB0DD42885B0EE0AE24FE098B6BA41AE6CD3D6FF9E08B9121BF30963BD4AFD09E053C77BE7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9972 |
Entropy (8bit): | 7.97977941086316 |
Encrypted: | false |
SSDEEP: | 192:qNwikWb6/2eAinXoyDzM1g5m/1h3et+18YYJL2ceHPvA:riVeUiYaMq+RYJLxwA |
MD5: | D8EE46409AA776A47DC1F4EA074D0EAB |
SHA1: | 7EC8CEB1BFDF6B4A127C0F06A285F87E5EC20449 |
SHA-256: | 12EFB95020D6E2AEFFD9B5CAC97789DF7ED1CA04FE67DA64F7538DB536F2669C |
SHA-512: | 2BF6A089F6EB4E1D72D66BED094B4AF588D83DEEA7E1DEF8813367C03FD1EE0E5E6A84EB6718A30B29E547F1533B9297465B9A767696980A2D647A3E03A49578 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6090 |
Entropy (8bit): | 7.969438107575008 |
Encrypted: | false |
SSDEEP: | 96:7ddGw5JiJ5IOvwK4kVRO7+tELRSsD/tdatk/VrP6gz8svlXiDghLRC4Euj:7ddGUEJp/ObR5D/2tkEg7XKghMmj |
MD5: | A3812720FC0937D2EBA51D972270E2C3 |
SHA1: | B45D2053EBE8BA417E16FB99D72D1C620B32B4F7 |
SHA-256: | A3F78610F2924B5DDD24A12CF2C59DCBEC131B10A905D99ECCD3B897292715EF |
SHA-512: | F900DFE3326EE94D01035859F8F807CB5BD22604F2359F3D7BB33FA5B8339EF008F3C4E9408E88D3F951B83E59C1E28F590CC09F56A175C00CA306E358740926 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 5.974444797015433 |
Encrypted: | false |
SSDEEP: | 192:U4A1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6gn9Mw:UYR7SrtTv53tdtTgwF4SQbGPX36g9Mw |
MD5: | 637E1FA13012A78922B6E98EFC0B12E2 |
SHA1: | 8012D44E42CD6D813EA63D5CCBF190FE72E3C778 |
SHA-256: | 703E17D30A91775F8DDC2648B537FC846FAD6415589A503A4529C36F60A17439 |
SHA-512: | 932ED6A52E89C4FA587A7C0C3903D69CF89A32DBD46ED8DCB251ABB6C15192D92B1F624C31F0E4BD3E9BF95FC1A55FDB7CEE9DD668E1B4F22DDB95786C063E96 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3425316567-2969588382-3778222414-1001\1b1d0082738e9f9011266f86ab9723d2_11389406-0377-47ed-98c7-d564e683c6eb
Download File
Process: | C:\Users\user\Desktop\EL378_SPEC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 47 |
Entropy (8bit): | 1.1262763721961973 |
Encrypted: | false |
SSDEEP: | 3:/lSllIEXln:AWE1 |
MD5: | D69FB7CE74DAC48982B69816C3772E4E |
SHA1: | B1C04CDB2567DC2B50D903B0E1D0D3211191E065 |
SHA-256: | 8CC6CA5CA4D0FA03842A60D90A6141F0B8D64969E830FC899DBA60ACB4905396 |
SHA-512: | 7E4EC58DA8335E43A4542E0F6E05FA2D15393E83634BE973AA3E758A870577BA0BA136F6E831907C4B30D587B8E6EEAFA2A4B8142F49714101BA50ECC294DDB0 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.491868618265534 |
TrID: |
|
File name: | EL378_SPEC.exe |
File size: | 598'968 bytes |
MD5: | 3bdbf0495a23287ddd05975e5e3b33f7 |
SHA1: | f2b6fc4711aebeabd45990ed03a58a79d26685d0 |
SHA256: | fbf85b3599b6741dc51a6a75bd9acc157d271595c9a8c36edee33c9d4482db8a |
SHA512: | 6608d3123591594c72bdeb2f53a146b62cb09a064a8e164934b31595bc315e9bee9aed05e49bead8fdd28dd3991d45fddf6b0be6ab9c2baf375fac6d4e1b0706 |
SSDEEP: | 6144:JMrudbcDdnhZP1v/u2q5h/oYmgEITzZ9IOPC+h3LtaDwB//iZBS69uTj9YXsjsZ+:JfEP5q5hA6HZ9Vt7t3CN9kWsj6CByh92 |
TLSH: | 6ED40183BD4046F5CCA67E74B02B825276666C3EB564AD8EF3DC335715F22229D1E322 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.<.L.o.L.o.L.op>.n.L.op>.n.L.op>.n.L.o.L.o.L.oa9.n.L.oa9Vo.L.oa9.n.L.oRich.L.o........PE..L....+.c.................r......... |
Icon Hash: | 176b4d69f18eb1e5 |
Entrypoint: | 0x4036fc |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x63132B9B [Sat Sep 3 10:25:31 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 3f91aceea750f765ef2ba5d9988e6a00 |
Signature Valid: | false |
Signature Issuer: | E=Droslinger@Mirsa.In, OU="Skyldsspaargsmaalets Forsknnet Cistercienserklostret ", O=Mazopathy, L=Villiers-Couture, S=Nouvelle-Aquitaine, C=FR |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 7363A57FA758A042D5B552E644C598B6 |
Thumbprint SHA-1: | 86285DB3EB1DAA6C190F13E295BB8322A8872EB7 |
Thumbprint SHA-256: | 027D8D2EA62E19C4D00606E7CD989A2D91F9317D6072DAA1BA0061B76351C385 |
Serial: | 5663A95713F27D4FE4056CEEAF09410163CA3BA5 |
Instruction |
---|
sub esp, 000003ECh |
push ebx |
push ebp |
push esi |
push edi |
xor ebx, ebx |
mov edi, 00409528h |
push 00008001h |
mov dword ptr [esp+14h], ebx |
mov ebp, ebx |
call dword ptr [00409170h] |
mov esi, dword ptr [004090ACh] |
lea eax, dword ptr [esp+2Ch] |
xorps xmm0, xmm0 |
mov dword ptr [esp+40h], ebx |
push eax |
movlpd qword ptr [esp+00000144h], xmm0 |
mov dword ptr [esp+30h], 0000011Ch |
call esi |
test eax, eax |
jne 00007FE1E85FB6A9h |
lea eax, dword ptr [esp+2Ch] |
mov dword ptr [esp+2Ch], 00000114h |
push eax |
call esi |
push 00000053h |
pop eax |
mov dl, 04h |
mov byte ptr [esp+00000146h], dl |
cmp word ptr [esp+40h], ax |
jne 00007FE1E85FB683h |
mov eax, dword ptr [esp+5Ah] |
add eax, FFFFFFD0h |
mov word ptr [esp+00000140h], ax |
jmp 00007FE1E85FB67Dh |
xor eax, eax |
jmp 00007FE1E85FB664h |
mov dl, byte ptr [esp+00000146h] |
cmp dword ptr [esp+30h], 0Ah |
jnc 00007FE1E85FB67Dh |
movzx eax, word ptr [esp+38h] |
mov dword ptr [esp+38h], eax |
jmp 00007FE1E85FB676h |
mov eax, dword ptr [esp+38h] |
mov dword ptr [00435AF8h], eax |
movzx eax, byte ptr [esp+30h] |
shl ax, 0008h |
movzx ecx, ax |
movzx eax, byte ptr [esp+34h] |
or ecx, eax |
movzx eax, byte ptr [esp+00000140h] |
shl ax, 0008h |
shl ecx, 10h |
movzx eax, word ptr [eax] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b0c | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x5b000 | 0x281e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x90088 | 0x2330 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x7032 | 0x7200 | False | 0.6497395833333334 | data | 6.41220875237026 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x19a2 | 0x1a00 | False | 0.455078125 | data | 5.04107190530894 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x2ab00 | 0x200 | False | 0.30078125 | data | 2.035495984906757 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x36000 | 0x25000 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x5b000 | 0x281e0 | 0x28200 | False | 0.44017718068535827 | data | 5.180624208298884 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x5b310 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.391991009109192 |
RT_ICON | 0x6bb38 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.4620821946605003 |
RT_ICON | 0x74fe0 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.47583179297597045 |
RT_ICON | 0x7a468 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.4557156353330184 |
RT_ICON | 0x7e690 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.5067427385892116 |
RT_ICON | 0x80c38 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.5225140712945591 |
RT_ICON | 0x81ce0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.5983606557377049 |
RT_ICON | 0x82668 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.6462765957446809 |
RT_DIALOG | 0x82ad0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x82bd0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x82cf0 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x82db8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x82e18 | 0x76 | data | English | United States | 0.7457627118644068 |
RT_MANIFEST | 0x82e90 | 0x349 | XML 1.0 document, ASCII text, with very long lines (841), with no line terminators | English | United States | 0.5541022592152199 |
DLL | Import |
---|---|
ADVAPI32.dll | RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW |
SHELL32.dll | ShellExecuteExW, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetSpecialFolderLocation |
ole32.dll | OleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance |
COMCTL32.dll | ImageList_Destroy, ImageList_AddMasked, ImageList_Create |
USER32.dll | DispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, PeekMessageW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, SetDlgItemTextW, GetDlgItemTextW, CharNextA, MessageBoxIndirectW, RegisterClassW, CharPrevW, LoadCursorW |
GDI32.dll | SetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW |
KERNEL32.dll | WriteFile, GetLastError, WaitForSingleObject, GetExitCodeProcess, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, RemoveDirectoryW, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 14, 2023 13:02:42.851408005 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.851428032 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:42.851655960 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.864115953 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.864128113 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:42.906330109 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:42.906583071 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.906583071 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.906816959 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:42.907280922 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:42.907470942 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.004925966 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.004937887 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.005228043 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.005382061 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.009079933 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.052114964 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.331801891 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.332009077 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.332092047 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.332212925 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.332236052 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.332285881 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.332285881 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.332330942 CEST | 443 | 49933 | 142.250.186.174 | 192.168.11.20 |
Aug 14, 2023 13:02:43.332370043 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.332495928 CEST | 49933 | 443 | 192.168.11.20 | 142.250.186.174 |
Aug 14, 2023 13:02:43.483234882 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.483261108 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.483529091 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.483808041 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.483825922 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.526778936 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.527015924 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.527627945 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.527959108 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.532107115 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.532123089 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.532427073 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.532563925 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.533073902 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.576069117 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.776810884 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.777113914 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.777170897 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.777342081 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.778206110 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.778434992 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.778435946 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.779957056 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.780236959 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.780731916 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.781021118 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.781589985 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.781739950 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.781795979 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.782012939 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.782459974 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.782704115 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.782763004 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.782951117 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.789366007 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.789540052 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.789599895 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.789783955 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.789824963 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.789979935 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.790018082 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.790159941 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.790512085 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.790798903 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.790852070 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.791070938 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.791362047 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.791528940 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.791585922 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.791805983 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.792346001 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.792516947 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.792577982 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.792743921 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.793092012 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.793303013 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.793356895 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.793504000 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.793936968 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.794097900 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.794142008 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.794403076 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.794924974 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.795094013 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.795150042 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.795319080 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.795543909 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.795716047 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.796186924 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.796338081 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.796379089 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.796530008 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.797070026 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.797219992 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.797260046 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.797437906 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.797820091 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.797971964 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.798023939 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.798182011 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.798214912 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.798453093 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.798491001 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.798635960 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.798664093 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.798829079 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.799227953 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.799452066 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.799508095 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.799757004 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.799983978 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.800131083 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.800220013 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.800415993 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.800837994 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.801031113 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.801079988 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.801316977 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.801579952 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.801743031 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.801776886 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.802000999 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.802249908 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.802407026 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.802448988 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.802680016 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.802712917 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.802819014 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.802939892 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.803097010 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.803143978 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.803373098 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.803415060 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.803563118 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.803838968 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.804029942 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.804084063 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.804306984 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.804342985 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.804490089 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.804517984 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.804733038 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.804775953 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.804999113 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.805054903 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.805198908 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.805226088 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.805254936 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.805375099 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.805376053 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.805638075 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.805800915 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.805855036 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.806016922 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.806046009 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.806160927 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.806179047 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.806355953 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.806384087 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.806524992 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.806622982 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.806782961 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.806844950 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.807018995 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.807064056 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.807284117 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.807318926 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.807461977 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.807511091 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.807657003 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.807727098 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.807946920 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.807997942 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.808140993 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.808173895 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.808319092 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.808680058 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.808906078 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.808929920 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809077978 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809123039 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809284925 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809312105 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809452057 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809470892 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809619904 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809638023 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809773922 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809792995 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.809943914 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.809967995 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.810113907 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.810427904 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.810596943 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.810668945 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.810868025 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.810905933 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811049938 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.811078072 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811248064 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.811281919 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811517954 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.811619043 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811827898 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.811852932 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811880112 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.811899900 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.811928988 CEST | 443 | 49934 | 142.250.185.97 | 192.168.11.20 |
Aug 14, 2023 13:02:43.812046051 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.812046051 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Aug 14, 2023 13:02:43.812092066 CEST | 49934 | 443 | 192.168.11.20 | 142.250.185.97 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Aug 14, 2023 13:02:42.837853909 CEST | 64237 | 53 | 192.168.11.20 | 1.1.1.1 |
Aug 14, 2023 13:02:42.846874952 CEST | 53 | 64237 | 1.1.1.1 | 192.168.11.20 |
Aug 14, 2023 13:02:43.450592041 CEST | 50022 | 53 | 192.168.11.20 | 1.1.1.1 |
Aug 14, 2023 13:02:43.482206106 CEST | 53 | 50022 | 1.1.1.1 | 192.168.11.20 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Aug 14, 2023 13:02:42.837853909 CEST | 192.168.11.20 | 1.1.1.1 | 0x43b4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Aug 14, 2023 13:02:43.450592041 CEST | 192.168.11.20 | 1.1.1.1 | 0x19d9 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Aug 14, 2023 13:02:42.846874952 CEST | 1.1.1.1 | 192.168.11.20 | 0x43b4 | No error (0) | 142.250.186.174 | A (IP address) | IN (0x0001) | false | ||
Aug 14, 2023 13:02:43.482206106 CEST | 1.1.1.1 | 192.168.11.20 | 0x19d9 | No error (0) | googlehosted.l.googleusercontent.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Aug 14, 2023 13:02:43.482206106 CEST | 1.1.1.1 | 192.168.11.20 | 0x19d9 | No error (0) | 142.250.185.97 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.11.20 | 49933 | 142.250.186.174 | 443 | C:\Users\user\Desktop\EL378_SPEC.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-08-14 11:02:43 UTC | 0 | OUT | |
2023-08-14 11:02:43 UTC | 0 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.11.20 | 49934 | 142.250.185.97 | 443 | C:\Users\user\Desktop\EL378_SPEC.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2023-08-14 11:02:43 UTC | 1 | OUT | |
2023-08-14 11:02:43 UTC | 2 | IN |