Windows
Analysis Report
1d0000.MSBuild.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 1d0000.MSBuild.exe (PID: 7416 cmdline:
"C:\Users\ user\Deskt op\1d0000. MSBuild.ex e" MD5: 41CF033D05AE0E2C5238A7932CF2DC77) - powershell.exe (PID: 7660 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " Start-Proc ess 'C:\Us ers\user\A ppData\Roa ming\X9ZLA QA9VR.exe' " MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7668 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_xehookStealer_1 | Yara detected Xehook Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_xehookStealer_1 | Yara detected Xehook Stealer | Joe Security | ||
JoeSecurity_xehookStealer_1 | Yara detected Xehook Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_xehookStealer_1 | Yara detected Xehook Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_xehookStealer_1 | Yara detected Xehook Stealer | Joe Security |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:13.959077+0200 | 2051457 | 1 | A Network Trojan was detected | 192.168.2.8 | 49706 | 65.109.218.88 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:14.649122+0200 | 2051458 | 1 | A Network Trojan was detected | 65.109.218.88 | 80 | 192.168.2.8 | 49706 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:13.959077+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.8 | 49706 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:20.601787+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.8 | 49710 | 87.250.250.50 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:17.912548+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:18.305457+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:16.248275+0200 | 2843856 | 1 | A Network Trojan was detected | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_00007FFB4AE25D62 |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | File created: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00007FFB4AE20906 | |
Source: | Code function: | 0_2_00007FFB4AE182A2 | |
Source: | Code function: | 0_2_00007FFB4AE1753F |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00007FFB4AE1002C | |
Source: | Code function: | 0_2_00007FFB4AE2A020 | |
Source: | Code function: | 0_2_00007FFB4AE2C0C7 | |
Source: | Code function: | 0_2_00007FFB4AE2A0B6 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 221 Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 231 Security Software Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 251 Virtualization/Sandbox Evasion | Security Account Manager | 251 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 14 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 2 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 123 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | BDS/Backdoor.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
disk.yandex.com | 87.250.250.50 | true | false | unknown | |
t.me | 149.154.167.99 | true | false | unknown | |
ip-api.com | 208.95.112.1 | true | false | unknown | |
fp2e7a.wpc.phicdn.net | 192.229.221.95 | true | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
87.250.250.50 | disk.yandex.com | Russian Federation | 13238 | YANDEXRU | false | |
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | false | |
65.109.218.88 | unknown | United States | 11022 | ALABANZA-BALTUS | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1504858 |
Start date and time: | 2024-09-05 14:28:13 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 3m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 1d0000.MSBuild.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/8@3/4 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 52.165.165.26, 192.229.221.95, 52.165.164.15
- Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target 1d0000.MSBuild.exe, PID 7416 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: 1d0000.MSBuild.exe
Time | Type | Description |
---|---|---|
08:29:11 | API Interceptor | |
08:29:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
87.250.250.50 | Get hash | malicious | Panda Stealer | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse | |||
Get hash | malicious | DanaBot, SmokeLoader | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | LummaC, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
ip-api.com | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
fp2e7a.wpc.phicdn.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
YANDEXRU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
ALABANZA-BALTUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | Xehook Stealer | Browse |
| ||
Get hash | malicious | NetSupport Downloader | Browse |
| ||
Get hash | malicious | NetSupport Downloader | Browse |
| ||
Get hash | malicious | NetSupport Downloader | Browse |
| ||
Get hash | malicious | NetSupport Downloader | Browse |
| ||
TUT-ASUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
1138de370e523e824bbca92d049a3777 | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MinerDownloader, RedLine, Xmrig | Browse |
| ||
Get hash | malicious | Babadeda, RedLine | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Desktop\1d0000.MSBuild.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1498 |
Entropy (8bit): | 5.364175471524945 |
Encrypted: | false |
SSDEEP: | 24:ML9E4KQwKDE4KGKZI6Kha1qE4GIs0E4KCKIE4TKBGKoZAE4KKUNCsXE4Npv:MxHKQwYHKGSI6oa1qHGIs0HKCtHTHhAu |
MD5: | 4498136F7C115EAA76D9BDA4497E42DE |
SHA1: | D490DC922B978B5657BFB5D611285343C27B2403 |
SHA-256: | 51FB932FFE68E1134CD2B88F4AB0CFB10DC266AD910B0A3949A98F2A6E9AD197 |
SHA-512: | C28DC4E3D78FC7CB4FA976832ECF75F0A915338A87888CADECAEDB67AFE7267FB638308B8FD48E07E10724A0AE88D7AFA0492D764E842433828AD58115AAC171 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 1.1940658735648508 |
Encrypted: | false |
SSDEEP: | 3:Nlllul3nqth:NllUa |
MD5: | 851531B4FD612B0BC7891B3F401A478F |
SHA1: | 483F0D1E71FB0F6EFF159AA96CC82422CF605FB3 |
SHA-256: | 383511F73A5CE9C50CD95B6321EFA51A8C6F18192BEEBBD532D4934E3BC1071F |
SHA-512: | A22D105E9F63872406FD271EF0A545BD76974C2674AEFF1B3256BCAC3C2128B9B8AA86B993A53BF87DBAC12ED8F00DCCAFD76E8BA431315B7953656A4CB4E931 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6222 |
Entropy (8bit): | 3.7284070018712265 |
Encrypted: | false |
SSDEEP: | 96:hEIVuCQP8zkvhkvCCtI6hd5UkwHePnd5UkBHePJ:hEIViPIVhd5Znd5CJ |
MD5: | 9B42AC600224541799FA2B281B77F6E0 |
SHA1: | 4691BC360C4E677AA902BD98610E671B7C07AADB |
SHA-256: | 1B9706C1A3EC3CF48BBF07D885F506D4846F5A8392BA6EF9D3DA3D00CF7D61A8 |
SHA-512: | 9B367B75473773ADC51EC2B9E03C8FA9A6088776A82CBF6ABF878E96CFEEF9CD1447867BF20D72B8DCA500CFC4F258FF93874FD7847454E658317565CB4F04FE |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QUF1NVVHW3OTUB5EOR5A.temp
Download File
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6222 |
Entropy (8bit): | 3.7284070018712265 |
Encrypted: | false |
SSDEEP: | 96:hEIVuCQP8zkvhkvCCtI6hd5UkwHePnd5UkBHePJ:hEIViPIVhd5Znd5CJ |
MD5: | 9B42AC600224541799FA2B281B77F6E0 |
SHA1: | 4691BC360C4E677AA902BD98610E671B7C07AADB |
SHA-256: | 1B9706C1A3EC3CF48BBF07D885F506D4846F5A8392BA6EF9D3DA3D00CF7D61A8 |
SHA-512: | 9B367B75473773ADC51EC2B9E03C8FA9A6088776A82CBF6ABF878E96CFEEF9CD1447867BF20D72B8DCA500CFC4F258FF93874FD7847454E658317565CB4F04FE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\1d0000.MSBuild.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 18680 |
Entropy (8bit): | 5.917803540927867 |
Encrypted: | false |
SSDEEP: | 384:lRRxpjNqsR2RRxpjNqsR6dHQvEhdePlDsU28J7u5vzfmCRdZW1ERCMiE2:rzmz6dwvS49DsJ8Bu5vzfmCR3/iE2 |
MD5: | 4ADD4FC3CDA4632C6E88EE7FF4829FFD |
SHA1: | 0DC2C6563FBEF948D06A813A58779D3A61E8FDF5 |
SHA-256: | 4228EBB79607E88B781ED422A11BEB7EFD80090C241C917D600D23E5A258B8DD |
SHA-512: | CC0C2A6AB4EAE691B41487A3F63B44D1F90A024122883DAD4DDC5229F2494A130B00EE13122941E029FBB5F889EDB856A72297ECB7B66A63F3C8BEFFE2609A64 |
Malicious: | true |
Preview: |
Process: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.3693810168601965 |
Encrypted: | false |
SSDEEP: | 6144:qFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNliL:CV1QyWWI/glMM6kF7/q |
MD5: | 608AA8655647A897CCF600A8AE90EAA5 |
SHA1: | 81B535404DE3450B92E7BFC063E33B0C054D5B7E |
SHA-256: | 2FDB57E3A2438145195D798663C37730C83F9D5DB8CEBC23F3BA269355671D81 |
SHA-512: | 317378FD7FB153E460177FD1861CF2D16E881388D430816340E95C0EFDE6B9217012AFDEAE31D50B2BF213CC84148B68D168CCE8A73F9A2FE962D30FCB3FFFCD |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 5.324127622058963 |
TrID: |
|
File name: | 1d0000.MSBuild.exe |
File size: | 154'624 bytes |
MD5: | 41cf033d05ae0e2c5238a7932cf2dc77 |
SHA1: | df885092f397a0a70f26b98c5abb35253d2cb06c |
SHA256: | f307cd4cb26d2d851ca55e9ab039656247ffd3b01b89ad0dcd32adf8e689724b |
SHA512: | eb1a3d4fe54c01c5ed6eb58208fed72aaf628aa6df60f5711f0e8e119a68517d7bc4112c5387858803072b144510fbd7c74f5e44853d3aefa5685979f755ef48 |
SSDEEP: | 3072:FzFIwXIUVadV/NqI9tw5ojnsbkps3CUBB8owEKctGE:RXcV/55jnsbkps3CUBB81EK |
TLSH: | BEE3979C72A476DFD86BC572DEA81CA4EB60787B931B8207A41311AD9E4C987CF141F3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.........."...0..R...........q... ........@.. ....................................`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x42710e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66C8899D [Fri Aug 23 13:07:41 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00632000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x270c0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x28000 | 0x55e | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x2a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x25114 | 0x25200 | 97d08115f9e8b759c2c2d9fba4976d0e | False | 0.3732901936026936 | SysEx File - | 5.3364911962924255 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x28000 | 0x55e | 0x600 | d0f6816dc3a649ccbe3350abe538303c | False | 0.3984375 | data | 3.91371853929423 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x2a000 | 0xc | 0x200 | 310037971a730240b1e6a6c653320f5d | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x280a0 | 0x2d4 | data | 0.430939226519337 | ||
RT_MANIFEST | 0x28374 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-05T14:29:13.959077+0200 | 2051457 | ET MALWARE Xehook Stealer CnC Checkin | 1 | 192.168.2.8 | 49706 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:13.959077+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.8 | 49706 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:14.649122+0200 | 2051458 | ET MALWARE Xehook Stealer CnC Checkin - Server Response | 1 | 65.109.218.88 | 80 | 192.168.2.8 | 49706 | TCP |
2024-09-05T14:29:16.248275+0200 | 2843856 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 | 1 | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:17.912548+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:18.305457+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | TCP |
2024-09-05T14:29:20.601787+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.8 | 49710 | 87.250.250.50 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 5, 2024 14:29:06.727446079 CEST | 49673 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:06.836704016 CEST | 49676 | 443 | 192.168.2.8 | 52.182.143.211 |
Sep 5, 2024 14:29:07.039844990 CEST | 49672 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:08.024292946 CEST | 49671 | 443 | 192.168.2.8 | 204.79.197.203 |
Sep 5, 2024 14:29:08.383507013 CEST | 49677 | 80 | 192.168.2.8 | 192.229.211.108 |
Sep 5, 2024 14:29:11.064666986 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.064697981 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:11.064779997 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.085342884 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.085355043 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:11.705267906 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:11.705332994 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.751666069 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.751688004 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:11.752063036 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:11.805370092 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.863934040 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:11.908510923 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198340893 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198367119 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198374033 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198401928 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198421001 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198430061 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198476076 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:12.198489904 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198512077 CEST | 443 | 49705 | 149.154.167.99 | 192.168.2.8 |
Sep 5, 2024 14:29:12.198528051 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:12.198554039 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:12.344254017 CEST | 49705 | 443 | 192.168.2.8 | 149.154.167.99 |
Sep 5, 2024 14:29:12.351639986 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:12.356595993 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:12.356713057 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:12.356852055 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:12.361649990 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.207253933 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.209711075 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:13.424206018 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.424268007 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:13.425028086 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.940529108 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.958990097 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:13.959076881 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:14.644121885 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:14.649122000 CEST | 80 | 49706 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:14.649193048 CEST | 49706 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:14.654109001 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:14.658926010 CEST | 80 | 49707 | 208.95.112.1 | 192.168.2.8 |
Sep 5, 2024 14:29:14.658992052 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:14.659105062 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:14.663836956 CEST | 80 | 49707 | 208.95.112.1 | 192.168.2.8 |
Sep 5, 2024 14:29:15.120493889 CEST | 80 | 49707 | 208.95.112.1 | 192.168.2.8 |
Sep 5, 2024 14:29:15.164807081 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:15.771441936 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:15.771464109 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:15.776360035 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:15.776465893 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:15.776657104 CEST | 80 | 49707 | 208.95.112.1 | 192.168.2.8 |
Sep 5, 2024 14:29:15.776683092 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:15.776705980 CEST | 49707 | 80 | 192.168.2.8 | 208.95.112.1 |
Sep 5, 2024 14:29:15.781440973 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.139096022 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.196924925 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197065115 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197094917 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197139978 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197237968 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197247982 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197257042 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197276115 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197321892 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197377920 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197387934 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197396994 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197424889 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197443962 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.197556973 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197566986 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.197622061 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.203217983 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203358889 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.203413010 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203422070 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203429937 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203493118 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.203517914 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.203655005 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203670025 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.203716040 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.243056059 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.243256092 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248169899 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248223066 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248245001 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248262882 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248275042 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248302937 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248336077 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248339891 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248357058 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248384953 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248456955 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248466969 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248512030 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248512983 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248522997 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248533010 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248564959 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248611927 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248632908 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248646975 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248656034 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248656034 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248665094 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248675108 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248684883 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248719931 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248738050 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248752117 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248760939 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248769999 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248780012 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248796940 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248806000 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248819113 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248821974 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.248837948 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248861074 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.248884916 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.253062010 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253128052 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253139019 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253149986 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253171921 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253211021 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253290892 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253299952 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253309965 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253324032 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253344059 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253353119 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253374100 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253427029 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253468990 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253478050 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253524065 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253532887 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253545046 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253571033 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253598928 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253611088 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253648996 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253658056 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253671885 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253680944 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253689051 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253731966 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253740072 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253812075 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253819942 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253868103 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253876925 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253937960 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253947020 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253954887 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.253993034 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254000902 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254018068 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254034996 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254059076 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254066944 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254079103 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254106045 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254137039 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254146099 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254160881 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254169941 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254201889 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254304886 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254338980 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254354000 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254365921 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254374027 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254422903 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254431963 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254440069 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254448891 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254466057 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254477978 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254493952 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.254503012 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.338308096 CEST | 49673 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:16.443552017 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:16.445991993 CEST | 49676 | 443 | 192.168.2.8 | 52.182.143.211 |
Sep 5, 2024 14:29:16.492911100 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:16.649163961 CEST | 49672 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:17.602586031 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:17.603239059 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:17.608109951 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:17.911480904 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:17.912548065 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:17.917368889 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:18.216716051 CEST | 443 | 49704 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:18.216835976 CEST | 49704 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:18.251148939 CEST | 80 | 49708 | 65.109.218.88 | 192.168.2.8 |
Sep 5, 2024 14:29:18.265892029 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:18.265950918 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:18.266033888 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:18.266593933 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:18.266609907 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:18.305457115 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:19.001585960 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.001805067 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.004844904 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.004856110 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.005251884 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.006587029 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.008529902 CEST | 49677 | 80 | 192.168.2.8 | 192.229.211.108 |
Sep 5, 2024 14:29:19.048507929 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.368077040 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.368166924 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.368182898 CEST | 443 | 49709 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.368231058 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.374439955 CEST | 49709 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.380477905 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.380512953 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:19.380614042 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.380830050 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:19.380841017 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.126506090 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.129539013 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.129575014 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.601810932 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.606753111 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.606772900 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.606838942 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.606874943 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.606893063 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.606928110 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.686487913 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.686572075 CEST | 443 | 49710 | 87.250.250.50 | 192.168.2.8 |
Sep 5, 2024 14:29:20.686686993 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.686686993 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:20.687232018 CEST | 49710 | 443 | 192.168.2.8 | 87.250.250.50 |
Sep 5, 2024 14:29:23.495486975 CEST | 49708 | 80 | 192.168.2.8 | 65.109.218.88 |
Sep 5, 2024 14:29:28.401298046 CEST | 49704 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:28.401532888 CEST | 49704 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:28.402014017 CEST | 49713 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:28.402051926 CEST | 443 | 49713 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:28.402110100 CEST | 49713 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:28.406179905 CEST | 443 | 49704 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:28.406261921 CEST | 443 | 49704 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:28.412434101 CEST | 49713 | 443 | 192.168.2.8 | 23.206.229.226 |
Sep 5, 2024 14:29:28.412457943 CEST | 443 | 49713 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:28.993690014 CEST | 443 | 49713 | 23.206.229.226 | 192.168.2.8 |
Sep 5, 2024 14:29:28.993784904 CEST | 49713 | 443 | 192.168.2.8 | 23.206.229.226 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 5, 2024 14:29:11.052393913 CEST | 57992 | 53 | 192.168.2.8 | 1.1.1.1 |
Sep 5, 2024 14:29:11.059288979 CEST | 53 | 57992 | 1.1.1.1 | 192.168.2.8 |
Sep 5, 2024 14:29:14.644743919 CEST | 60896 | 53 | 192.168.2.8 | 1.1.1.1 |
Sep 5, 2024 14:29:14.651838064 CEST | 53 | 60896 | 1.1.1.1 | 192.168.2.8 |
Sep 5, 2024 14:29:18.255635977 CEST | 60395 | 53 | 192.168.2.8 | 1.1.1.1 |
Sep 5, 2024 14:29:18.263622046 CEST | 53 | 60395 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 5, 2024 14:29:11.052393913 CEST | 192.168.2.8 | 1.1.1.1 | 0x4ad0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 5, 2024 14:29:14.644743919 CEST | 192.168.2.8 | 1.1.1.1 | 0xb51f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 5, 2024 14:29:18.255635977 CEST | 192.168.2.8 | 1.1.1.1 | 0x17ad | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 5, 2024 14:29:11.059288979 CEST | 1.1.1.1 | 192.168.2.8 | 0x4ad0 | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false | ||
Sep 5, 2024 14:29:14.651838064 CEST | 1.1.1.1 | 192.168.2.8 | 0xb51f | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Sep 5, 2024 14:29:18.263622046 CEST | 1.1.1.1 | 192.168.2.8 | 0x17ad | No error (0) | 87.250.250.50 | A (IP address) | IN (0x0001) | false | ||
Sep 5, 2024 14:29:27.394973993 CEST | 1.1.1.1 | 192.168.2.8 | 0x5adf | No error (0) | fp2e7a.wpc.phicdn.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 5, 2024 14:29:27.394973993 CEST | 1.1.1.1 | 192.168.2.8 | 0x5adf | No error (0) | 192.229.221.95 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49706 | 65.109.218.88 | 80 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 5, 2024 14:29:12.356852055 CEST | 188 | OUT | |
Sep 5, 2024 14:29:13.207253933 CEST | 243 | IN | |
Sep 5, 2024 14:29:13.209711075 CEST | 57 | OUT | |
Sep 5, 2024 14:29:13.424206018 CEST | 243 | IN | |
Sep 5, 2024 14:29:13.940529108 CEST | 521 | IN | |
Sep 5, 2024 14:29:13.958990097 CEST | 521 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49707 | 208.95.112.1 | 80 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 5, 2024 14:29:14.659105062 CEST | 78 | OUT | |
Sep 5, 2024 14:29:15.120493889 CEST | 367 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.8 | 49708 | 65.109.218.88 | 80 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 5, 2024 14:29:15.776683092 CEST | 543 | OUT | |
Sep 5, 2024 14:29:16.139096022 CEST | 12360 | OUT | |
Sep 5, 2024 14:29:16.197065115 CEST | 2472 | OUT | |
Sep 5, 2024 14:29:16.197139978 CEST | 2472 | OUT | |
Sep 5, 2024 14:29:16.197276115 CEST | 2472 | OUT | |
Sep 5, 2024 14:29:16.197321892 CEST | 4944 | OUT | |
Sep 5, 2024 14:29:16.197424889 CEST | 4944 | OUT | |
Sep 5, 2024 14:29:16.197443962 CEST | 2472 | OUT | |
Sep 5, 2024 14:29:16.197622061 CEST | 4944 | OUT | |
Sep 5, 2024 14:29:16.203358889 CEST | 2472 | OUT | |
Sep 5, 2024 14:29:16.203493118 CEST | 4944 | OUT | |
Sep 5, 2024 14:29:16.443552017 CEST | 25 | IN | |
Sep 5, 2024 14:29:17.602586031 CEST | 155 | IN | |
Sep 5, 2024 14:29:17.603239059 CEST | 184 | OUT | |
Sep 5, 2024 14:29:17.911480904 CEST | 198 | IN | |
Sep 5, 2024 14:29:17.912548065 CEST | 184 | OUT | |
Sep 5, 2024 14:29:18.251148939 CEST | 198 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49705 | 149.154.167.99 | 443 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-05 12:29:11 UTC | 196 | OUT | |
2024-09-05 12:29:12 UTC | 511 | IN | |
2024-09-05 12:29:12 UTC | 12255 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49709 | 87.250.250.50 | 443 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-05 12:29:19 UTC | 81 | OUT | |
2024-09-05 12:29:19 UTC | 1754 | IN | |
2024-09-05 12:29:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.8 | 49710 | 87.250.250.50 | 443 | 7416 | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-05 12:29:20 UTC | 720 | OUT | |
2024-09-05 12:29:20 UTC | 778 | IN | |
2024-09-05 12:29:20 UTC | 16384 | IN | |
2024-09-05 12:29:20 UTC | 2296 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:29:09 |
Start date: | 05/09/2024 |
Path: | C:\Users\user\Desktop\1d0000.MSBuild.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1c2541e0000 |
File size: | 154'624 bytes |
MD5 hash: | 41CF033D05AE0E2C5238A7932CF2DC77 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 08:29:20 |
Start date: | 05/09/2024 |
Path: | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6cb6b0000 |
File size: | 452'608 bytes |
MD5 hash: | 04029E121A0CFA5991749937DD22A1D9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:29:20 |
Start date: | 05/09/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4AE25D62 Relevance: 1.8, APIs: 1, Instructions: 254encryptionCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4AE182A2 Relevance: .5, Instructions: 461COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFB4AE1753F Relevance: .4, Instructions: 443COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|