Windows
Analysis Report
TEiot52yrz.exe
Overview
General Information
Sample name: | TEiot52yrz.exerenamed because original name is a hash value |
Original sample name: | 915cc233f5c3b36f2aa5a9a0aa2fcd28b8ee406e42c08b71177dab901c219d41.exe |
Analysis ID: | 1508525 |
MD5: | fa332de9a0e7da5e975173ee47246172 |
SHA1: | c6e74c68a11a9d318137aba895f2bcde89d42f2b |
SHA256: | 915cc233f5c3b36f2aa5a9a0aa2fcd28b8ee406e42c08b71177dab901c219d41 |
Tags: | 116-198-231-169exe |
Infos: | |
Detection
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- TEiot52yrz.exe (PID: 6740 cmdline:
"C:\Users\ user\Deskt op\TEiot52 yrz.exe" MD5: FA332DE9A0E7DA5E975173EE47246172) - WerFault.exe (PID: 5092 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 740 -s 110 0 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cobalt Strike, CobaltStrike | Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable. |
{"C2Server": "http://116.198.231.169:63222/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
{"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n", "Type": "Metasploit Download", "URL": "http://116.198.231.169/jquery-3.3.2.slim.min.js"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Metasploit_7bc0f998 | Identifies the API address lookup function leverage by metasploit shellcode | unknown |
| |
Windows_Trojan_Metasploit_c9773203 | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MetasploitPayload_3 | Yara detected Metasploit Payload | Joe Security | ||
JoeSecurity_CobaltStrike_3 | Yara detected CobaltStrike | Joe Security | ||
Windows_Trojan_Metasploit_7bc0f998 | Identifies the API address lookup function leverage by metasploit shellcode | unknown |
| |
Windows_Trojan_Metasploit_c9773203 | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. | unknown |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-10T10:59:46.099185+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49699 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:50.318619+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49702 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:54.697952+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49705 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:59.017704+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49708 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:03.146814+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49713 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:07.587572+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49718 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:11.860949+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49721 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:16.128098+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49724 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:20.591162+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49727 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:25.056689+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.7 | 49730 | 116.198.231.169 | 63222 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FF6295454A4 | |
Source: | Code function: | 0_2_00007FF62954603A | |
Source: | Code function: | 0_2_00007FF629545785 | |
Source: | Code function: | 0_2_00007FF629545D5C | |
Source: | Code function: | 0_2_00007FF629543DE8 |
Source: | Process created: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_000000E1057AE4A7 | |
Source: | Code function: | 0_2_000000E1057AE4A7 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FF62954365C |
Source: | Code function: | 0_2_00007FF62954365C | |
Source: | Code function: | 0_2_00007FF629542B74 | |
Source: | Code function: | 0_2_00007FF629543804 |
Source: | Code function: | 0_2_00007FF629543874 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 DLL Side-Loading | LSASS Memory | 21 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 2 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
61% | ReversingLabs | Win64.Backdoor.MeterpreterReverseShell | ||
60% | Virustotal | Browse | ||
100% | Avira | TR/AD.MeterpreterSC.zrtjs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
1% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Virustotal | Browse | ||
0% | Virustotal | Browse |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
116.198.231.169 | unknown | China | 137699 | CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian | true |
Joe Sandbox version: | 40.0.0 Tourmaline |
Analysis ID: | 1508525 |
Start date and time: | 2024-09-10 10:58:49 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 20 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | TEiot52yrz.exerenamed because original name is a hash value |
Original Sample Name: | 915cc233f5c3b36f2aa5a9a0aa2fcd28b8ee406e42c08b71177dab901c219d41.exe |
Detection: | MAL |
Classification: | mal96.troj.winEXE@2/5@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29
- Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
116.198.231.169 | Get hash | malicious | CobaltStrike, Metasploit | Browse | ||
Get hash | malicious | CobaltStrike, Metasploit | Browse | |||
Get hash | malicious | CobaltStrike, Metasploit | Browse | |||
Get hash | malicious | CobaltStrike, Metasploit | Browse | |||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian | Get hash | malicious | CobaltStrike, Metasploit | Browse |
| |
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TEiot52yrz.exe_2714b4b2d07e7c82202e7568b15aa71dbc91f2_8fd4efbb_65b56a23-ade3-47d4-9527-560feaa0e927\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9251117719939682 |
Encrypted: | false |
SSDEEP: | 96:08KFch54fs4hqKeoh7Ru6NbQXIDcQWc6zcEZcw37diG+HbHg/JgWlB8sKa9bATFd:y2hGfUn0I3D8jcoTzuiFQZ24lO81 |
MD5: | EF451BBBC610FAB97E4FDF3A69CF34C5 |
SHA1: | 6A646600AE3CECA3337AAEC63F4FBB113AF51050 |
SHA-256: | 666C47B30C8EA3C832A9FE7ECB6D7313AEB05C29B844E853D40CD3BA98D7683F |
SHA-512: | 4ED4FB5108145102075C5ACE2BF7217DB2C5EAFB7D36E1CD1155899D5D4C2396485AC0C2483BDC05ADA5938F3C994564C27181D4D0AAAE5C11FEB098FF7597B4 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 143164 |
Entropy (8bit): | 1.4890973548404032 |
Encrypted: | false |
SSDEEP: | 768:VS0dRtXD6tvQWrlzLiSwcl+ajiFcUAM00Ycs05:VtGWSwcl+ajiFcUAM00Ycs05 |
MD5: | 758F8C737E871E435EAC81934EDD67D5 |
SHA1: | 6D0F9AC2B28DC02E5C54045BAB6C20CB7E0A684A |
SHA-256: | 6EFB72D06EDD829B89F9A71F7658A588D4CEB9C3CDE52D21A5FD13D86D33FC70 |
SHA-512: | 7B4A5124D4FF8F60392E32A4D054E7C914456D65EBE0FB22407E7EE28DE3B4E118F54228EB98271F4255B664774DA6BCCA9DB5DDBC86E2AF3181A73C443F40F8 |
Malicious: | false |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8904 |
Entropy (8bit): | 3.7022527896205872 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ5Pfm6YNlPU9WgmfO5pDa89b9Qkf/J/m:R6lXJhfm6YvPU9WgmfOv97fE |
MD5: | 6BB548B09CDC80C99113CD04121FAA58 |
SHA1: | 4E292F35C8DFB3C85B1F2F042CEDD4FE10E65DB9 |
SHA-256: | C8FA248ABE06263ED2EC43E1BA9DDD6C218A9143C20CEB31F09C814E54FC18F2 |
SHA-512: | ED972BB85D10DBC9C104B1F19C39BD9D35C12B50732B8327A4262A402E3BB8B05EAE96CD761897EA0F45636D3FBEA57FD30F773C0F36BE79FA36034DBE81EB50 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4800 |
Entropy (8bit): | 4.479614085306091 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zshaJg771I9vrD8WpW8VYlYm8M4JK6OO1FfB6Fmyq8vG6OOnETx1d:uIjfhoI7Ux7V1JKB64FmWGBLTx1d |
MD5: | 705F0242C2E10DA316E7F0CF08ACBB1E |
SHA1: | 6D2CA6326BB4FC626C5FDC7E6536B68E9A49E4E4 |
SHA-256: | 037E27635AB1111604AB4FB10120378FB226F8A5956B54AD02EF9BCF930A9BE9 |
SHA-512: | D9781985A74A21FF6CA36B302DDF63ACBE9DE710136D06D3CFB87C3E91A7F8849A3110B303FAAACD90B1F5F9A70411568CB01E8FFFAB2C1205EA7BF2CB5C7A6F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.416758848885135 |
Encrypted: | false |
SSDEEP: | 6144:Tcifpi6ceLPL9skLmb0mVSWSPtaJG8nAgex285i2MMhA20X4WABlGuN45+:Ii58VSWIZBk2MM6AFBWo |
MD5: | EBD339429AB5788DC4184CB9A47FEE41 |
SHA1: | 2563E222E87E1D971B1222AA44D333B5E81E7A38 |
SHA-256: | C60881FEE778E08EA70701FDA5A7AF1235DA64A31FB5F0EDC1150F3E3F961ED9 |
SHA-512: | 962638F5A144BEF13D5045A4212C1772E02D29F6BE22109EC647EECB671A1739AEA1F9F886EE9C45769B91CAA2A82227C46D247ABA642113C1B8C5F302D80215 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.5071715281779605 |
TrID: |
|
File name: | TEiot52yrz.exe |
File size: | 53'760 bytes |
MD5: | fa332de9a0e7da5e975173ee47246172 |
SHA1: | c6e74c68a11a9d318137aba895f2bcde89d42f2b |
SHA256: | 915cc233f5c3b36f2aa5a9a0aa2fcd28b8ee406e42c08b71177dab901c219d41 |
SHA512: | d929f944ebf93719ff6762bcfc56927a29418d71f72636be72b443f6c7d1e04dc6de6e56f8077e2c435f0d7afedf511e99c5768083c243f5f763587ec4158546 |
SSDEEP: | 1536:zli07qgtT9e0uLwwpX996H810S4oqiedINb:zli07qgtg0uLwwp6HGgGb |
TLSH: | F633394BEB5256F4F0BBE234C1A2B23BF9F139A45631AB0F96D555030B22770A43E749 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:n6\[.e\[.e\[.eU#.eP[.e...dX[.e...dV[.e...dG[.e...dZ[.e.#.dY[.e\[.e.[.eO..d_[.eO..d][.eRich\[.e........................PE..d.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x1400032f8 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66758E29 [Fri Jun 21 14:28:57 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | bd1e68ad73a2d648185022e899d7f29c |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F14B9364E68h |
dec eax |
add esp, 28h |
jmp 00007F14B9364767h |
int3 |
int3 |
jmp 00007F14B936509Eh |
int3 |
int3 |
int3 |
dec eax |
and dword ptr [ecx+10h], 00000000h |
dec eax |
lea eax, dword ptr [00005090h] |
dec eax |
mov dword ptr [ecx+08h], eax |
dec eax |
lea eax, dword ptr [00005075h] |
dec eax |
mov dword ptr [ecx], eax |
dec eax |
mov eax, ecx |
ret |
int3 |
int3 |
dec eax |
sub esp, 48h |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007F14B93648C7h |
dec eax |
lea edx, dword ptr [000099EFh] |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007F14B9364FBAh |
int3 |
dec eax |
sub esp, 48h |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007F14B93627FBh |
dec eax |
lea edx, dword ptr [00009A9Fh] |
dec eax |
lea ecx, dword ptr [esp+20h] |
call 00007F14B9364F9Ah |
int3 |
dec eax |
mov dword ptr [esp+10h], ebx |
dec eax |
mov dword ptr [esp+18h], esi |
push ebp |
push edi |
inc ecx |
push esi |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 10h |
xor eax, eax |
xor ecx, ecx |
cpuid |
inc esp |
mov eax, ecx |
inc esp |
mov edx, edx |
inc ecx |
xor edx, 49656E69h |
inc ecx |
xor eax, 6C65746Eh |
inc esp |
mov ecx, ebx |
inc esp |
mov esi, eax |
xor ecx, ecx |
mov eax, 00000001h |
cpuid |
inc ebp |
or edx, eax |
mov dword ptr [ebp-10h], eax |
inc ecx |
xor ecx, 756E6547h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xce24 | 0xf0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xf000 | 0x630 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x10000 | 0x6c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xc2f0 | 0x38 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xc1b0 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6432 | 0x6600 | 8759b1b67f2b54eac6557e9c4522457e | False | 0.36278339460784315 | Macintosh HFS Extended version -16056 data (mounted) last mounted by: 'H\20', created: Fri Aug 26 02:24:04 2078, last modified: Sun Mar 11 23:42:58 2057, last backup: Mon Dec 18 02:10:29 2028, block size: -1064976267, number of blocks: -616002748, free blocks: 609241227 | 5.60729868940022 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x5b70 | 0x5c00 | 7092854450d6513858403ce1ddf23e97 | False | 0.6414741847826086 | data | 7.175727936294308 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xe000 | 0x7a0 | 0x200 | a762b3a5c773f37ff67e8e610aabbdce | False | 0.251953125 | DOS executable (block device driver) | 2.236712118068703 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xf000 | 0x630 | 0x800 | 200a12bd55e0318e3d7585101f49e6d3 | False | 0.3828125 | data | 3.4957689526148887 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x10000 | 0x6c | 0x200 | 7068c81aba75ebf8f944a190333902ff | False | 0.220703125 | data | 1.3343316886712333 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, GetModuleHandleW, IsDebuggerPresent, LoadLibraryA, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, InitializeSListHead, IsProcessorFeaturePresent, VirtualProtect |
MSVCP140.dll | ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?flags@ios_base@std@@QEBAHXZ, ?width@ios_base@std@@QEBA_JXZ, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?uncaught_exception@std@@YA_NXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?width@ios_base@std@@QEAA_J_J@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?good@ios_base@std@@QEBA_NXZ |
CRYPT32.dll | CertEnumSystemStore |
VCRUNTIME140_1.dll | __CxxFrameHandler4 |
VCRUNTIME140.dll | memcpy, __std_exception_destroy, __std_exception_copy, memchr, memset, __C_specific_handler, _CxxThrowException, __current_exception, __current_exception_context |
api-ms-win-crt-string-l1-1-0.dll | isalnum, strlen |
api-ms-win-crt-runtime-l1-1-0.dll | _c_exit, _register_thread_local_exe_atexit_callback, __p___argv, _get_initial_narrow_environment, terminate, _register_onexit_function, _exit, exit, _crt_atexit, _initialize_narrow_environment, _initterm, _configure_narrow_argv, _set_app_type, _initterm_e, _invalid_parameter_noinfo_noreturn, _cexit, __p___argc, _seh_filter_exe, _initialize_onexit_table |
api-ms-win-crt-heap-l1-1-0.dll | malloc, free, _set_new_mode, _callnewh |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-stdio-l1-1-0.dll | __p__commode, _set_fmode |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-10T10:59:46.099185+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49699 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:50.318619+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49702 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:54.697952+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49705 | 116.198.231.169 | 63222 | TCP |
2024-09-10T10:59:59.017704+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49708 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:03.146814+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49713 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:07.587572+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49718 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:11.860949+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49721 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:16.128098+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49724 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:20.591162+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49727 | 116.198.231.169 | 63222 | TCP |
2024-09-10T11:00:25.056689+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.7 | 49730 | 116.198.231.169 | 63222 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 10, 2024 10:59:43.972151995 CEST | 49699 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:43.977313995 CEST | 63222 | 49699 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:43.977458954 CEST | 49699 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:43.991163015 CEST | 49699 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:43.996651888 CEST | 63222 | 49699 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:46.099113941 CEST | 63222 | 49699 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:46.099184990 CEST | 49699 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:46.099423885 CEST | 49699 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:46.099953890 CEST | 49700 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:46.104733944 CEST | 63222 | 49699 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:46.105032921 CEST | 63222 | 49700 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:46.105102062 CEST | 49700 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:46.105573893 CEST | 49700 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:46.110395908 CEST | 63222 | 49700 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.151405096 CEST | 63222 | 49700 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.151539087 CEST | 49700 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.151684999 CEST | 49700 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.152153015 CEST | 49701 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.156481981 CEST | 63222 | 49700 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.157078981 CEST | 63222 | 49701 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.157314062 CEST | 49701 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.157366991 CEST | 49701 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.166421890 CEST | 63222 | 49701 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.166537046 CEST | 49701 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.172611952 CEST | 49702 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.179253101 CEST | 63222 | 49702 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:48.179580927 CEST | 49702 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.179897070 CEST | 49702 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:48.185365915 CEST | 63222 | 49702 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:50.318541050 CEST | 63222 | 49702 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:50.318619013 CEST | 49702 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:50.318698883 CEST | 49702 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:50.319192886 CEST | 49703 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:50.323503017 CEST | 63222 | 49702 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:50.323982954 CEST | 63222 | 49703 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:50.324048042 CEST | 49703 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:50.324383974 CEST | 49703 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:50.329168081 CEST | 63222 | 49703 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.520307064 CEST | 63222 | 49703 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.520411968 CEST | 49703 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.520508051 CEST | 49703 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.521123886 CEST | 49704 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.527534962 CEST | 63222 | 49703 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.527661085 CEST | 63222 | 49704 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.527739048 CEST | 49704 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.527868032 CEST | 49704 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.530951977 CEST | 49705 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.535240889 CEST | 63222 | 49704 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.535312891 CEST | 49704 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.538208961 CEST | 63222 | 49705 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:52.538311958 CEST | 49705 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.538573027 CEST | 49705 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:52.545279026 CEST | 63222 | 49705 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:54.697649002 CEST | 63222 | 49705 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:54.697952032 CEST | 49705 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:54.697952032 CEST | 49705 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:54.699110031 CEST | 49706 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:54.702986956 CEST | 63222 | 49705 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:54.704154968 CEST | 63222 | 49706 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:54.704430103 CEST | 49706 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:54.704484940 CEST | 49706 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:54.709484100 CEST | 63222 | 49706 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.756551027 CEST | 63222 | 49706 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.756675005 CEST | 49706 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.756788969 CEST | 49706 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.757324934 CEST | 49707 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.761663914 CEST | 63222 | 49706 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.762231112 CEST | 63222 | 49707 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.762334108 CEST | 49707 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.762609005 CEST | 49707 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.767800093 CEST | 63222 | 49707 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.767811060 CEST | 49708 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.767884970 CEST | 49707 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.772756100 CEST | 63222 | 49708 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:56.772840023 CEST | 49708 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.773192883 CEST | 49708 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:56.778187037 CEST | 63222 | 49708 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:59.017549992 CEST | 63222 | 49708 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:59.017704010 CEST | 49708 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:59.018088102 CEST | 49708 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:59.018752098 CEST | 49709 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:59.024022102 CEST | 63222 | 49708 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:59.024771929 CEST | 63222 | 49709 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 10:59:59.024857044 CEST | 49709 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:59.025238037 CEST | 49709 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 10:59:59.030251980 CEST | 63222 | 49709 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.049603939 CEST | 63222 | 49709 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.049693108 CEST | 49709 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.049894094 CEST | 49709 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.050647020 CEST | 49712 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.054769039 CEST | 63222 | 49709 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.055771112 CEST | 63222 | 49712 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.055845022 CEST | 49712 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.056022882 CEST | 49712 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.061100006 CEST | 63222 | 49712 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.061155081 CEST | 49712 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.061166048 CEST | 49713 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.066019058 CEST | 63222 | 49713 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:01.066124916 CEST | 49713 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.066514969 CEST | 49713 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:01.071779966 CEST | 63222 | 49713 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:03.143757105 CEST | 63222 | 49713 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:03.146814108 CEST | 49713 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:03.148253918 CEST | 49713 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:03.148775101 CEST | 49716 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:03.153038025 CEST | 63222 | 49713 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:03.153706074 CEST | 63222 | 49716 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:03.153776884 CEST | 49716 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:03.154088020 CEST | 49716 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:03.158961058 CEST | 63222 | 49716 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.434926033 CEST | 63222 | 49716 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.434993982 CEST | 49716 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.435138941 CEST | 49716 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.435676098 CEST | 49717 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.440125942 CEST | 63222 | 49716 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.440861940 CEST | 63222 | 49717 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.440939903 CEST | 49717 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.441046953 CEST | 49717 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.442179918 CEST | 49718 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.446335077 CEST | 63222 | 49717 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.446394920 CEST | 49717 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.447007895 CEST | 63222 | 49718 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:05.447069883 CEST | 49718 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.447288990 CEST | 49718 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:05.452447891 CEST | 63222 | 49718 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:07.587426901 CEST | 63222 | 49718 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:07.587572098 CEST | 49718 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:07.587656021 CEST | 49718 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:07.590481043 CEST | 49719 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:07.592910051 CEST | 63222 | 49718 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:07.596303940 CEST | 63222 | 49719 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:07.596380949 CEST | 49719 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:07.596662045 CEST | 49719 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:07.601563931 CEST | 63222 | 49719 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.816725016 CEST | 63222 | 49719 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.816843987 CEST | 49719 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.816936970 CEST | 49719 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.820101976 CEST | 49720 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.821743965 CEST | 63222 | 49719 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.824927092 CEST | 63222 | 49720 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.825016022 CEST | 49720 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.825126886 CEST | 49720 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.827548027 CEST | 49721 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.830112934 CEST | 63222 | 49720 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.830193996 CEST | 49720 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.832587004 CEST | 63222 | 49721 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:09.832662106 CEST | 49721 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.832873106 CEST | 49721 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:09.838016033 CEST | 63222 | 49721 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:11.860795021 CEST | 63222 | 49721 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:11.860949039 CEST | 49721 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:11.861026049 CEST | 49721 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:11.865348101 CEST | 49722 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:11.865828991 CEST | 63222 | 49721 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:11.871022940 CEST | 63222 | 49722 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:11.871112108 CEST | 49722 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:11.871618986 CEST | 49722 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:11.877341032 CEST | 63222 | 49722 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.081623077 CEST | 63222 | 49722 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.081718922 CEST | 49722 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.081842899 CEST | 49722 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.086638927 CEST | 63222 | 49722 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.091692924 CEST | 49723 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.096596003 CEST | 63222 | 49723 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.096662045 CEST | 49723 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.096729040 CEST | 49723 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.098356009 CEST | 49724 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.101869106 CEST | 63222 | 49723 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.101919889 CEST | 49723 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.103277922 CEST | 63222 | 49724 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:14.103333950 CEST | 49724 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.103593111 CEST | 49724 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:14.108494043 CEST | 63222 | 49724 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:16.127887011 CEST | 63222 | 49724 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:16.128098011 CEST | 49724 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:16.128550053 CEST | 49724 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:16.130781889 CEST | 49725 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:16.133354902 CEST | 63222 | 49724 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:16.135687113 CEST | 63222 | 49725 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:16.135792017 CEST | 49725 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:16.136075974 CEST | 49725 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:16.140858889 CEST | 63222 | 49725 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.163306952 CEST | 63222 | 49725 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.163461924 CEST | 49725 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.163582087 CEST | 49725 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.167049885 CEST | 49726 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.168477058 CEST | 63222 | 49725 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.171889067 CEST | 63222 | 49726 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.172049046 CEST | 49726 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.172187090 CEST | 49726 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.173966885 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.177504063 CEST | 63222 | 49726 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.177592993 CEST | 49726 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.178792953 CEST | 63222 | 49727 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:18.178858042 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.179099083 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:18.183881044 CEST | 63222 | 49727 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:20.591058016 CEST | 63222 | 49727 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:20.591161966 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.591257095 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.591325045 CEST | 63222 | 49727 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:20.591372967 CEST | 49727 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.593662024 CEST | 49728 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.596359968 CEST | 63222 | 49727 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:20.598519087 CEST | 63222 | 49728 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:20.598618031 CEST | 49728 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.599016905 CEST | 49728 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:20.603828907 CEST | 63222 | 49728 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.684892893 CEST | 63222 | 49728 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.685106993 CEST | 49728 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.685138941 CEST | 49728 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.688007116 CEST | 49729 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.691412926 CEST | 63222 | 49728 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.692833900 CEST | 63222 | 49729 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.692923069 CEST | 49729 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.693108082 CEST | 49729 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.695633888 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.698731899 CEST | 63222 | 49729 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.698800087 CEST | 49729 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.700431108 CEST | 63222 | 49730 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:22.700503111 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.700844049 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:22.705663919 CEST | 63222 | 49730 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:25.056629896 CEST | 63222 | 49730 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:25.056689024 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.056796074 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.056905985 CEST | 63222 | 49730 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:25.056943893 CEST | 49730 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.061747074 CEST | 63222 | 49730 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:25.070270061 CEST | 49731 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.075108051 CEST | 63222 | 49731 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:25.075193882 CEST | 49731 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.075467110 CEST | 49731 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:25.080230951 CEST | 63222 | 49731 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:27.225442886 CEST | 63222 | 49731 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:27.225560904 CEST | 49731 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:27.225641966 CEST | 49731 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:27.230053902 CEST | 49732 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:27.230480909 CEST | 63222 | 49731 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:27.234925985 CEST | 63222 | 49732 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:27.235027075 CEST | 49732 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:27.236588001 CEST | 49732 | 63222 | 192.168.2.7 | 116.198.231.169 |
Sep 10, 2024 11:00:27.241586924 CEST | 63222 | 49732 | 116.198.231.169 | 192.168.2.7 |
Sep 10, 2024 11:00:27.241638899 CEST | 49732 | 63222 | 192.168.2.7 | 116.198.231.169 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:59:41 |
Start date: | 10/09/2024 |
Path: | C:\Users\user\Desktop\TEiot52yrz.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff629540000 |
File size: | 53'760 bytes |
MD5 hash: | FA332DE9A0E7DA5E975173EE47246172 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 13 |
Start time: | 06:53:37 |
Start date: | 10/09/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff671c80000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 10.7% |
Dynamic/Decrypted Code Coverage: | 0.5% |
Signature Coverage: | 8.3% |
Total number of Nodes: | 375 |
Total number of Limit Nodes: | 1 |
Graph
Function 00007FF629546AFC Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 99librarymemoryencryptionCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000E1057AE24B Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 99networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF629543DE8 Relevance: 6.6, APIs: 2, Strings: 2, Instructions: 581COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF629543874 Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF6295454A4 Relevance: .6, Instructions: 556COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF629545D5C Relevance: .6, Instructions: 556COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF629545785 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF62954603A Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF629543804 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|