Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 7268 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 8E487FECB6D9126067B432788DB011DE) - OmegaEngine.exe (PID: 7328 cmdline:
"C:\Users\ user\Docum ents\Syste m\OmegaEng ine.exe" - B --donate -level 1 - o xmr-eu1. nanopool.o rg:10343 - u 85SayJHv DATLk8TMFy eQYG3aX3Gn PkzbcWnyZ4 NkUtVbJTUM dF9GqEn24D tX8c8Qf9c6 jKQVWzVLaB EUBS7B8Rjn 9413x5b -k --coin mo nero -o xm r-eu2.nano pool.org:1 0343 -u 85 SayJHvDATL k8TMFyeQYG 3aX3GnPkzb cWnyZ4NkUt VbJTUMdF9G qEn24DtX8c 8Qf9c6jKQV WzVLaBEUBS 7B8Rjn9413 x5b -k --c oin monero MD5: 2C5F8843F514824FC636F451FC6A18B4) - conhost.exe (PID: 7336 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MAL_XMR_Miner_May19_1 | Detects Monero Crypto Coin Miner | Florian Roth |
| |
MALWARE_Win_CoinMiner02 | Detects coinmining malware | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 12 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
MAL_XMR_Miner_May19_1 | Detects Monero Crypto Coin Miner | Florian Roth |
| |
MALWARE_Win_CoinMiner02 | Detects coinmining malware | ditekSHen |
| |
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-03T22:36:17.402087+0100 | 2022930 | 1 | A Network Trojan was detected | 4.245.163.56 | 443 | 192.168.2.4 | 49733 | TCP |
2024-11-03T22:36:56.888569+0100 | 2022930 | 1 | A Network Trojan was detected | 4.245.163.56 | 443 | 192.168.2.4 | 49748 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-03T22:35:59.175889+0100 | 2826930 | 2 | Crypto Currency Mining Activity Detected | 192.168.2.4 | 49804 | 51.15.65.182 | 10343 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Bitcoin Miner |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00007FFD9BAC0A69 |
Source: | Dropped File: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Binary string: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FFD9BAC00C1 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 1_2_00757C00 |
Source: | Directory queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Command and Scripting Interpreter | 1 Windows Service | 1 Windows Service | 1 Masquerading | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 11 Process Injection | 2 Virtualization/Sandbox Evasion | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | 1 Data from Local System | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Disable or Modify Tools | Security Account Manager | 2 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 1 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Timestomp | Cached Domain Credentials | 11 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 12 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | ByteCode-MSIL.Trojan.Zilla | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
74% | ReversingLabs | Win32.Trojan.Convagent | ||
5% | ReversingLabs | |||
53% | ReversingLabs | ByteCode-MSIL.Trojan.Zilla |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
xmr-eu1.nanopool.org | 163.172.154.142 | true | true | unknown | |
xmr-eu2.nanopool.org | 51.15.61.114 | true | true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
51.68.137.186 | unknown | France | 16276 | OVHFR | true | |
51.15.65.182 | unknown | France | 12876 | OnlineSASFR | true | |
51.195.138.197 | unknown | France | 16276 | OVHFR | true | |
163.172.154.142 | xmr-eu1.nanopool.org | United Kingdom | 12876 | OnlineSASFR | true | |
54.37.137.114 | unknown | France | 16276 | OVHFR | true | |
51.15.58.224 | unknown | France | 12876 | OnlineSASFR | true | |
51.15.193.130 | unknown | France | 12876 | OnlineSASFR | true | |
51.15.89.13 | unknown | France | 12876 | OnlineSASFR | true | |
54.37.232.103 | unknown | France | 16276 | OVHFR | true | |
212.47.253.124 | unknown | France | 12876 | OnlineSASFR | true | |
146.59.154.106 | unknown | Norway | 16276 | OVHFR | true | |
141.94.23.83 | unknown | Germany | 680 | DFNVereinzurFoerderungeinesDeutschenForschungsnetzese | true | |
51.89.23.91 | unknown | France | 16276 | OVHFR | true | |
51.15.61.114 | xmr-eu2.nanopool.org | France | 12876 | OnlineSASFR | true | |
51.195.43.17 | unknown | France | 16276 | OVHFR | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1548107 |
Start date and time: | 2024-11-03 22:35:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.mine.winEXE@4/5@2/15 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target OmegaEngine.exe, PID 7328 because there are no executed function
- Execution Graph export aborted for target file.exe, PID 7268 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: file.exe
Time | Type | Description |
---|---|---|
16:36:30 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
51.68.137.186 | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Glupteba, LummaC Stealer, RedLine, SmokeLoader, Stealc, Xmrig | Browse | |||
51.15.65.182 | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Go Injector, Vidar, Xmrig | Browse | |||
Get hash | malicious | Cryptbot, Vidar, Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | LummaC, Xmrig | Browse | |||
Get hash | malicious | AsyncRAT, PureLog Stealer, Xmrig, zgRAT | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Glupteba, RedLine, SmokeLoader, Vidar, Xmrig | Browse | |||
Get hash | malicious | Glupteba, LummaC Stealer, RedLine, SmokeLoader, Stealc, Vidar, Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
51.195.138.197 | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Glupteba, Xmrig | Browse | |||
Get hash | malicious | Glupteba, RedLine, SmokeLoader, Stealc, Vidar, Xmrig | Browse | |||
163.172.154.142 | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | AsyncRAT, Nbminer, Xmrig | Browse | |||
Get hash | malicious | Xmrig, zgRAT | Browse | |||
Get hash | malicious | Glupteba, RedLine, SmokeLoader, Vidar, Xmrig | Browse | |||
Get hash | malicious | Glupteba, RedLine, SmokeLoader, Xmrig | Browse | |||
Get hash | malicious | Amadey, Fabookie, SmokeLoader, Xmrig | Browse | |||
Get hash | malicious | Phonk Miner, Xmrig | Browse | |||
54.37.137.114 | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
xmr-eu2.nanopool.org | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Glupteba, Xmrig | Browse |
| ||
xmr-eu1.nanopool.org | Get hash | malicious | Xmrig | Browse |
| |
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Stealc, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
OVHFR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Kronos, Strela Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, PureLog Stealer, zgRAT | Browse |
| ||
OnlineSASFR | Get hash | malicious | Kronos, Strela Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | AveMaria, WhiteSnake Stealer | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
OVHFR | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Emotet | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Kronos, Strela Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT, PureLog Stealer, zgRAT | Browse |
| ||
OnlineSASFR | Get hash | malicious | Kronos, Strela Stealer | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | AveMaria, WhiteSnake Stealer | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\Documents\System\WinRing0x64.sys | Get hash | malicious | Xmrig | Browse | ||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Xmrig | Browse |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | modified |
Size (bytes): | 7162880 |
Entropy (8bit): | 6.44050646793195 |
Encrypted: | false |
SSDEEP: | 196608:HCXYEhEswp8HD1XF2XTnTuTmVpDce4EQ/H5Tc05tI8lCt30fWsaVb:2JwCMcwQ/IV39b |
MD5: | 2C5F8843F514824FC636F451FC6A18B4 |
SHA1: | A1C5490EFEA431FA3F54562D0D19D4F6826C562A |
SHA-256: | 363841B14E9048FD50A012F2A3E04C3F86312FBCD3C1F4A837A102FE7E258CA7 |
SHA-512: | B51CF66C2604E4E9ED363933CFB2ACAD7E1591036B1F8339333AA6D74625B680A952078DCDBD231204E06572D9CA24855D19138DD77EAABC673AB148B89BE717 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14544 |
Entropy (8bit): | 6.2660301556221185 |
Encrypted: | false |
SSDEEP: | 192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ |
MD5: | 0C0195C48B6B8582FA6F6373032118DA |
SHA1: | D25340AE8E92A6D29F599FEF426A2BC1B5217299 |
SHA-256: | 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5 |
SHA-512: | AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2293 |
Entropy (8bit): | 3.8248326943422386 |
Encrypted: | false |
SSDEEP: | 48:CtWTHcW08bqUZylCfby+F1IfF0lFGRdyCSPCoECyo12udQK9Q:CtWTvZy+F1IfF0lFGRdyCmCZCN2u39Q |
MD5: | EFE186D3302FE8B6F6C751610DC424D6 |
SHA1: | 0B75736C95ACAB29A0D8CBF7EDBEF454F3529EE5 |
SHA-256: | 90D678F599884EB4EE0F2A12DC297AD02521D58CB1020708185CA92C83DCD00F |
SHA-512: | FF7A707B1C01FDBCF184E612BA59E4DBA7B2499D95ADF268A862787C6C29D7DB32D9831E0579DA054F190A09B6B54B69E28D503353996BD3C43E3B623F4498A9 |
Malicious: | true |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7277568 |
Entropy (8bit): | 6.475803918016148 |
Encrypted: | false |
SSDEEP: | 98304:/vUOUlzvyfQprVfSHy9fierzHjhlTkil3IVcWvy:/vUO6vRvSy1Ll3WJ |
MD5: | 8E487FECB6D9126067B432788DB011DE |
SHA1: | 78C25B2BD8BA6EB1781E5634484D2B425E9C6367 |
SHA-256: | 235C665B25C1E78FED3CA96E57C374E5A416AAD1D27B4AE436A1C6C58604268B |
SHA-512: | 1EF29D3D1CE3816E7DAAC5C876570E4290FD259F2FA1C14E2B3F9E881F65A13F1C788B9C0D4DF3D149A4E79584020819902FD605F025392887141EA7BACECA69 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
File type: | |
Entropy (8bit): | 6.475803918016148 |
TrID: |
|
File name: | file.exe |
File size: | 7'277'568 bytes |
MD5: | 8e487fecb6d9126067b432788db011de |
SHA1: | 78c25b2bd8ba6eb1781e5634484d2b425e9c6367 |
SHA256: | 235c665b25c1e78fed3ca96e57c374e5a416aad1d27b4ae436a1c6c58604268b |
SHA512: | 1ef29d3d1ce3816e7daac5c876570e4290fd259f2fa1c14e2b3f9e881f65a13f1c788b9c0d4df3d149a4e79584020819902fd605f025392887141ea7baceca69 |
SSDEEP: | 98304:/vUOUlzvyfQprVfSHy9fierzHjhlTkil3IVcWvy:/vUO6vRvSy1Ll3WJ |
TLSH: | 28764B01A53A39C8F419E57695E4F8B36D3EBC51C0CFC0ECA0827606E9B99A52FF4176 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0...m..V......J.m.. ....m...@.. .......................`o...........`................................ |
Icon Hash: | 0f3b715254693b0f |
Entrypoint: | 0xadd34a |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xF500D2FC [Sat Apr 3 21:45:32 2100 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6dd2f5 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x6de000 | 0x153c0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x6f4000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x6dd230 | 0x38 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x6db350 | 0x6db400 | 5d3a24a2d0e2921248fac4a8eb4a4d68 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x6de000 | 0x153c0 | 0x15400 | 87caa9c5937c1ad8850fbba357cc95f7 | False | 0.20534237132352942 | data | 3.706662108554457 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x6f4000 | 0xc | 0x200 | af9b1df2422d53eed4512c7b2dcc4004 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x6de180 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 3779 x 3779 px/m | 0.6914893617021277 | ||
RT_ICON | 0x6de5f8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/m | 0.578688524590164 | ||
RT_ICON | 0x6def90 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m | 0.4950750469043152 | ||
RT_ICON | 0x6e0048 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 3779 x 3779 px/m | 0.38516597510373446 | ||
RT_ICON | 0x6e2600 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 3779 x 3779 px/m | 0.14431267005796758 | ||
RT_GROUP_ICON | 0x6f2e38 | 0x4c | data | 0.7763157894736842 | ||
RT_VERSION | 0x6f2e94 | 0x32c | data | 0.42610837438423643 | ||
RT_MANIFEST | 0x6f31d0 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-03T22:35:59.175889+0100 | 2826930 | ETPRO COINMINER XMR CoinMiner Usage | 2 | 192.168.2.4 | 49804 | 51.15.65.182 | 10343 | TCP |
2024-11-03T22:36:17.402087+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.245.163.56 | 443 | 192.168.2.4 | 49733 | TCP |
2024-11-03T22:36:56.888569+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 4.245.163.56 | 443 | 192.168.2.4 | 49748 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 3, 2024 22:35:59.186935902 CET | 49730 | 10343 | 192.168.2.4 | 54.37.137.114 |
Nov 3, 2024 22:35:59.191925049 CET | 10343 | 49730 | 54.37.137.114 | 192.168.2.4 |
Nov 3, 2024 22:35:59.192003012 CET | 49730 | 10343 | 192.168.2.4 | 54.37.137.114 |
Nov 3, 2024 22:35:59.192143917 CET | 49730 | 10343 | 192.168.2.4 | 54.37.137.114 |
Nov 3, 2024 22:35:59.196906090 CET | 10343 | 49730 | 54.37.137.114 | 192.168.2.4 |
Nov 3, 2024 22:36:00.533607006 CET | 10343 | 49730 | 54.37.137.114 | 192.168.2.4 |
Nov 3, 2024 22:36:00.533694029 CET | 49730 | 10343 | 192.168.2.4 | 54.37.137.114 |
Nov 3, 2024 22:36:00.542023897 CET | 49730 | 10343 | 192.168.2.4 | 54.37.137.114 |
Nov 3, 2024 22:36:00.546945095 CET | 10343 | 49730 | 54.37.137.114 | 192.168.2.4 |
Nov 3, 2024 22:36:06.343432903 CET | 49731 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:36:06.348402977 CET | 10343 | 49731 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:36:06.348486900 CET | 49731 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:36:06.352488995 CET | 49731 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:36:06.357285023 CET | 10343 | 49731 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:36:07.628834009 CET | 10343 | 49731 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:36:07.648549080 CET | 49731 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:36:07.650645018 CET | 49731 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:36:07.655551910 CET | 10343 | 49731 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:36:13.428096056 CET | 49732 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:36:13.433166027 CET | 10343 | 49732 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:36:13.433332920 CET | 49732 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:36:13.433346033 CET | 49732 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:36:13.438266993 CET | 10343 | 49732 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:36:14.702950001 CET | 10343 | 49732 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:36:14.706262112 CET | 49732 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:36:14.747191906 CET | 49732 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:36:14.754935980 CET | 10343 | 49732 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:36:20.543076992 CET | 49738 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:20.548047066 CET | 10343 | 49738 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:20.548154116 CET | 49738 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:20.548645020 CET | 49738 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:20.553446054 CET | 10343 | 49738 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:21.860130072 CET | 10343 | 49738 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:21.860219955 CET | 49738 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:21.860559940 CET | 49738 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:21.865531921 CET | 10343 | 49738 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:27.537604094 CET | 49740 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:27.542521954 CET | 10343 | 49740 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:27.542629004 CET | 49740 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:27.542740107 CET | 49740 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:27.547486067 CET | 10343 | 49740 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:28.759535074 CET | 10343 | 49740 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:28.759598970 CET | 49740 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:28.759711981 CET | 49740 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:28.764497995 CET | 10343 | 49740 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:28.768867016 CET | 49741 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:28.773714066 CET | 10343 | 49741 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:28.773777008 CET | 49741 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:28.773933887 CET | 49741 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:28.778803110 CET | 10343 | 49741 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:30.089523077 CET | 10343 | 49741 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:30.089603901 CET | 49741 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:30.089708090 CET | 49741 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:30.094643116 CET | 10343 | 49741 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:34.600265026 CET | 49742 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:36:34.605242014 CET | 10343 | 49742 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:36:34.605334997 CET | 49742 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:36:34.605443954 CET | 49742 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:36:34.610230923 CET | 10343 | 49742 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:36:35.600105047 CET | 49743 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:35.605151892 CET | 10343 | 49743 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:35.605242014 CET | 49743 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:35.605380058 CET | 49743 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:35.610230923 CET | 10343 | 49743 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:35.953212976 CET | 10343 | 49742 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:36:35.953344107 CET | 49742 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:36:35.953469038 CET | 49742 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:36:35.959570885 CET | 10343 | 49742 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:36:37.021477938 CET | 10343 | 49743 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:37.021670103 CET | 49743 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:37.021928072 CET | 49743 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:37.026700974 CET | 10343 | 49743 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:41.633066893 CET | 49744 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:41.638092995 CET | 10343 | 49744 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:41.638189077 CET | 49744 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:41.638431072 CET | 49744 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:41.643246889 CET | 10343 | 49744 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:42.647202969 CET | 49745 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:36:42.652143002 CET | 10343 | 49745 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:36:42.652245998 CET | 49745 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:36:42.652380943 CET | 49745 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:36:42.657167912 CET | 10343 | 49745 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:36:43.105063915 CET | 10343 | 49744 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:43.105295897 CET | 49744 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:43.107835054 CET | 49744 | 10343 | 192.168.2.4 | 51.89.23.91 |
Nov 3, 2024 22:36:43.112581015 CET | 10343 | 49744 | 51.89.23.91 | 192.168.2.4 |
Nov 3, 2024 22:36:43.921912909 CET | 10343 | 49745 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:36:43.922122955 CET | 49745 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:36:43.922240019 CET | 49745 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:36:43.927063942 CET | 10343 | 49745 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:36:48.678725004 CET | 49746 | 10343 | 192.168.2.4 | 51.15.58.224 |
Nov 3, 2024 22:36:48.683727026 CET | 10343 | 49746 | 51.15.58.224 | 192.168.2.4 |
Nov 3, 2024 22:36:48.683831930 CET | 49746 | 10343 | 192.168.2.4 | 51.15.58.224 |
Nov 3, 2024 22:36:48.683984995 CET | 49746 | 10343 | 192.168.2.4 | 51.15.58.224 |
Nov 3, 2024 22:36:48.689363003 CET | 10343 | 49746 | 51.15.58.224 | 192.168.2.4 |
Nov 3, 2024 22:36:49.693610907 CET | 49747 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:36:49.698638916 CET | 10343 | 49747 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:36:49.698736906 CET | 49747 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:36:49.698865891 CET | 49747 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:36:49.703649998 CET | 10343 | 49747 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:36:50.082381010 CET | 10343 | 49746 | 51.15.58.224 | 192.168.2.4 |
Nov 3, 2024 22:36:50.085297108 CET | 49746 | 10343 | 192.168.2.4 | 51.15.58.224 |
Nov 3, 2024 22:36:50.085391045 CET | 49746 | 10343 | 192.168.2.4 | 51.15.58.224 |
Nov 3, 2024 22:36:50.090420961 CET | 10343 | 49746 | 51.15.58.224 | 192.168.2.4 |
Nov 3, 2024 22:36:50.925720930 CET | 10343 | 49747 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:36:50.925826073 CET | 49747 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:36:50.925921917 CET | 49747 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:36:50.932547092 CET | 10343 | 49747 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:36:55.741257906 CET | 49749 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:55.746826887 CET | 10343 | 49749 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:55.746911049 CET | 49749 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:55.747006893 CET | 49749 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:55.752230883 CET | 10343 | 49749 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:56.740700960 CET | 49751 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:56.746959925 CET | 10343 | 49751 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:56.747035027 CET | 49751 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:56.747160912 CET | 49751 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:56.752737045 CET | 10343 | 49751 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:56.981384039 CET | 10343 | 49749 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:56.981441975 CET | 49749 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:56.981554031 CET | 49749 | 10343 | 192.168.2.4 | 212.47.253.124 |
Nov 3, 2024 22:36:56.986553907 CET | 10343 | 49749 | 212.47.253.124 | 192.168.2.4 |
Nov 3, 2024 22:36:58.029736996 CET | 10343 | 49751 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:36:58.029977083 CET | 49751 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:58.030061960 CET | 49751 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:36:58.034852028 CET | 10343 | 49751 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:02.772003889 CET | 49772 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:02.776938915 CET | 10343 | 49772 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:02.777024031 CET | 49772 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:02.777153969 CET | 49772 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:02.782471895 CET | 10343 | 49772 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:03.771889925 CET | 49778 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:03.777884960 CET | 10343 | 49778 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:03.777977943 CET | 49778 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:03.778168917 CET | 49778 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:03.783087015 CET | 10343 | 49778 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:04.144999981 CET | 10343 | 49772 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:04.145073891 CET | 49772 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:04.145165920 CET | 49772 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:04.150710106 CET | 10343 | 49772 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:05.015614986 CET | 10343 | 49778 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:05.015790939 CET | 49778 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:05.015902996 CET | 49778 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:05.020673990 CET | 10343 | 49778 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:09.787589073 CET | 49804 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:37:09.792431116 CET | 10343 | 49804 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:37:09.792546034 CET | 49804 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:37:09.792635918 CET | 49804 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:37:09.797421932 CET | 10343 | 49804 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:37:10.788048029 CET | 49810 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:10.793050051 CET | 10343 | 49810 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:10.793127060 CET | 49810 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:10.793255091 CET | 49810 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:10.798010111 CET | 10343 | 49810 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:11.046680927 CET | 10343 | 49804 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:37:11.048398018 CET | 49804 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:37:11.048523903 CET | 49804 | 10343 | 192.168.2.4 | 51.15.65.182 |
Nov 3, 2024 22:37:11.053308964 CET | 10343 | 49804 | 51.15.65.182 | 192.168.2.4 |
Nov 3, 2024 22:37:12.110167027 CET | 10343 | 49810 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:12.110265017 CET | 49810 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:12.110380888 CET | 49810 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:12.115190029 CET | 10343 | 49810 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:16.821319103 CET | 49836 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:16.826883078 CET | 10343 | 49836 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:37:16.826998949 CET | 49836 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:16.827231884 CET | 49836 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:16.832024097 CET | 10343 | 49836 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:37:17.834359884 CET | 49842 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:17.839360952 CET | 10343 | 49842 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:17.839452982 CET | 49842 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:17.839551926 CET | 49842 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:17.844641924 CET | 10343 | 49842 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:18.056305885 CET | 10343 | 49836 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:37:18.056374073 CET | 49836 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:18.056446075 CET | 49836 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:18.061279058 CET | 10343 | 49836 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:37:19.214898109 CET | 10343 | 49842 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:19.215038061 CET | 49842 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:19.215583086 CET | 49842 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:19.220443964 CET | 10343 | 49842 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:23.865613937 CET | 49867 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:23.870512962 CET | 10343 | 49867 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:23.870592117 CET | 49867 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:23.870752096 CET | 49867 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:23.875495911 CET | 10343 | 49867 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:24.865885019 CET | 49873 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:24.870779037 CET | 10343 | 49873 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:24.870837927 CET | 49873 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:24.870933056 CET | 49873 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:24.875742912 CET | 10343 | 49873 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:25.267693043 CET | 10343 | 49867 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:25.267796040 CET | 49867 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:25.267872095 CET | 49867 | 10343 | 192.168.2.4 | 54.37.232.103 |
Nov 3, 2024 22:37:25.272943974 CET | 10343 | 49867 | 54.37.232.103 | 192.168.2.4 |
Nov 3, 2024 22:37:26.181765079 CET | 10343 | 49873 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:26.181835890 CET | 49873 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:26.181924105 CET | 49873 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:26.186801910 CET | 10343 | 49873 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:30.912735939 CET | 49898 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:30.917659998 CET | 10343 | 49898 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:30.917747974 CET | 49898 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:30.917879105 CET | 49898 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:30.923079967 CET | 10343 | 49898 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:31.912415981 CET | 49901 | 10343 | 192.168.2.4 | 51.68.137.186 |
Nov 3, 2024 22:37:31.917427063 CET | 10343 | 49901 | 51.68.137.186 | 192.168.2.4 |
Nov 3, 2024 22:37:31.917525053 CET | 49901 | 10343 | 192.168.2.4 | 51.68.137.186 |
Nov 3, 2024 22:37:31.917710066 CET | 49901 | 10343 | 192.168.2.4 | 51.68.137.186 |
Nov 3, 2024 22:37:31.922590017 CET | 10343 | 49901 | 51.68.137.186 | 192.168.2.4 |
Nov 3, 2024 22:37:32.200154066 CET | 10343 | 49898 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:32.200217962 CET | 49898 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:32.200304031 CET | 49898 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:32.205236912 CET | 10343 | 49898 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:33.296921015 CET | 10343 | 49901 | 51.68.137.186 | 192.168.2.4 |
Nov 3, 2024 22:37:33.296968937 CET | 49901 | 10343 | 192.168.2.4 | 51.68.137.186 |
Nov 3, 2024 22:37:33.297055960 CET | 49901 | 10343 | 192.168.2.4 | 51.68.137.186 |
Nov 3, 2024 22:37:33.301805973 CET | 10343 | 49901 | 51.68.137.186 | 192.168.2.4 |
Nov 3, 2024 22:37:37.943878889 CET | 49927 | 10343 | 192.168.2.4 | 163.172.154.142 |
Nov 3, 2024 22:37:37.948935032 CET | 10343 | 49927 | 163.172.154.142 | 192.168.2.4 |
Nov 3, 2024 22:37:37.949023962 CET | 49927 | 10343 | 192.168.2.4 | 163.172.154.142 |
Nov 3, 2024 22:37:37.949173927 CET | 49927 | 10343 | 192.168.2.4 | 163.172.154.142 |
Nov 3, 2024 22:37:37.953954935 CET | 10343 | 49927 | 163.172.154.142 | 192.168.2.4 |
Nov 3, 2024 22:37:38.943907022 CET | 49932 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:38.948782921 CET | 10343 | 49932 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:38.948848963 CET | 49932 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:38.948992014 CET | 49932 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:38.953772068 CET | 10343 | 49932 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:39.206495047 CET | 10343 | 49927 | 163.172.154.142 | 192.168.2.4 |
Nov 3, 2024 22:37:39.206577063 CET | 49927 | 10343 | 192.168.2.4 | 163.172.154.142 |
Nov 3, 2024 22:37:39.206667900 CET | 49927 | 10343 | 192.168.2.4 | 163.172.154.142 |
Nov 3, 2024 22:37:39.213320017 CET | 10343 | 49927 | 163.172.154.142 | 192.168.2.4 |
Nov 3, 2024 22:37:40.186871052 CET | 10343 | 49932 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:40.186953068 CET | 49932 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:40.187026978 CET | 49932 | 10343 | 192.168.2.4 | 51.15.61.114 |
Nov 3, 2024 22:37:40.191860914 CET | 10343 | 49932 | 51.15.61.114 | 192.168.2.4 |
Nov 3, 2024 22:37:44.975744009 CET | 49958 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:44.981816053 CET | 10343 | 49958 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:44.981909990 CET | 49958 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:44.982100964 CET | 49958 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:44.987452984 CET | 10343 | 49958 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:45.990746975 CET | 49963 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:45.997221947 CET | 10343 | 49963 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:45.997355938 CET | 49963 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:45.997736931 CET | 49963 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:46.003881931 CET | 10343 | 49963 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:46.306267023 CET | 10343 | 49958 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:46.306446075 CET | 49958 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:46.306474924 CET | 49958 | 10343 | 192.168.2.4 | 141.94.23.83 |
Nov 3, 2024 22:37:46.311239958 CET | 10343 | 49958 | 141.94.23.83 | 192.168.2.4 |
Nov 3, 2024 22:37:47.306799889 CET | 10343 | 49963 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:47.306876898 CET | 49963 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:47.306969881 CET | 49963 | 10343 | 192.168.2.4 | 51.195.43.17 |
Nov 3, 2024 22:37:47.311887026 CET | 10343 | 49963 | 51.195.43.17 | 192.168.2.4 |
Nov 3, 2024 22:37:52.021806002 CET | 49989 | 10343 | 192.168.2.4 | 146.59.154.106 |
Nov 3, 2024 22:37:52.026771069 CET | 10343 | 49989 | 146.59.154.106 | 192.168.2.4 |
Nov 3, 2024 22:37:52.026834011 CET | 49989 | 10343 | 192.168.2.4 | 146.59.154.106 |
Nov 3, 2024 22:37:52.026952982 CET | 49989 | 10343 | 192.168.2.4 | 146.59.154.106 |
Nov 3, 2024 22:37:52.031774998 CET | 10343 | 49989 | 146.59.154.106 | 192.168.2.4 |
Nov 3, 2024 22:37:53.021919966 CET | 49994 | 10343 | 192.168.2.4 | 51.195.138.197 |
Nov 3, 2024 22:37:53.027174950 CET | 10343 | 49994 | 51.195.138.197 | 192.168.2.4 |
Nov 3, 2024 22:37:53.027270079 CET | 49994 | 10343 | 192.168.2.4 | 51.195.138.197 |
Nov 3, 2024 22:37:53.027429104 CET | 49994 | 10343 | 192.168.2.4 | 51.195.138.197 |
Nov 3, 2024 22:37:53.034169912 CET | 10343 | 49994 | 51.195.138.197 | 192.168.2.4 |
Nov 3, 2024 22:37:53.315157890 CET | 10343 | 49989 | 146.59.154.106 | 192.168.2.4 |
Nov 3, 2024 22:37:53.315242052 CET | 49989 | 10343 | 192.168.2.4 | 146.59.154.106 |
Nov 3, 2024 22:37:53.315330029 CET | 49989 | 10343 | 192.168.2.4 | 146.59.154.106 |
Nov 3, 2024 22:37:53.320197105 CET | 10343 | 49989 | 146.59.154.106 | 192.168.2.4 |
Nov 3, 2024 22:37:54.323065042 CET | 10343 | 49994 | 51.195.138.197 | 192.168.2.4 |
Nov 3, 2024 22:37:54.323132038 CET | 49994 | 10343 | 192.168.2.4 | 51.195.138.197 |
Nov 3, 2024 22:37:54.323221922 CET | 49994 | 10343 | 192.168.2.4 | 51.195.138.197 |
Nov 3, 2024 22:37:54.328051090 CET | 10343 | 49994 | 51.195.138.197 | 192.168.2.4 |
Nov 3, 2024 22:37:59.069003105 CET | 50020 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:59.073920965 CET | 10343 | 50020 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:37:59.073995113 CET | 50020 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:59.074151039 CET | 50020 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:37:59.078948975 CET | 10343 | 50020 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:38:00.068761110 CET | 50025 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:38:00.073662996 CET | 10343 | 50025 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:38:00.073838949 CET | 50025 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:38:00.073838949 CET | 50025 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:38:00.078728914 CET | 10343 | 50025 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:38:00.336813927 CET | 10343 | 50020 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:38:00.336968899 CET | 50020 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:38:00.336968899 CET | 50020 | 10343 | 192.168.2.4 | 51.15.193.130 |
Nov 3, 2024 22:38:00.342621088 CET | 10343 | 50020 | 51.15.193.130 | 192.168.2.4 |
Nov 3, 2024 22:38:01.328090906 CET | 10343 | 50025 | 51.15.89.13 | 192.168.2.4 |
Nov 3, 2024 22:38:01.328295946 CET | 50025 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:38:01.334275961 CET | 50025 | 10343 | 192.168.2.4 | 51.15.89.13 |
Nov 3, 2024 22:38:01.339107990 CET | 10343 | 50025 | 51.15.89.13 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 3, 2024 22:35:59.175889015 CET | 57155 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 3, 2024 22:35:59.184923887 CET | 53 | 57155 | 1.1.1.1 | 192.168.2.4 |
Nov 3, 2024 22:36:28.760613918 CET | 58644 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 3, 2024 22:36:28.767889023 CET | 53 | 58644 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 3, 2024 22:35:59.175889015 CET | 192.168.2.4 | 1.1.1.1 | 0xa3d2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 3, 2024 22:36:28.760613918 CET | 192.168.2.4 | 1.1.1.1 | 0xd4d2 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 163.172.154.142 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 212.47.253.124 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 51.15.193.130 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 51.15.58.224 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 51.15.65.182 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 146.59.154.106 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 51.89.23.91 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 54.37.137.114 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 141.94.23.83 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 162.19.224.121 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:35:59.184923887 CET | 1.1.1.1 | 192.168.2.4 | 0xa3d2 | No error (0) | 54.37.232.103 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.15.61.114 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.68.137.186 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.195.43.17 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.195.138.197 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 163.172.171.111 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.15.89.13 | A (IP address) | IN (0x0001) | false | ||
Nov 3, 2024 22:36:28.767889023 CET | 1.1.1.1 | 192.168.2.4 | 0xd4d2 | No error (0) | 51.210.150.92 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 16:35:57 |
Start date: | 03/11/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x269f0200000 |
File size: | 7'277'568 bytes |
MD5 hash: | 8E487FECB6D9126067B432788DB011DE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 16:35:58 |
Start date: | 03/11/2024 |
Path: | C:\Users\user\Documents\System\OmegaEngine.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 7'162'880 bytes |
MD5 hash: | 2C5F8843F514824FC636F451FC6A18B4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 16:35:58 |
Start date: | 03/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Function 00007FFD9BAC0A69 Relevance: .5, Instructions: 498COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC112D Relevance: .4, Instructions: 350COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC11A1 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC2139 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC26E1 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC107D Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC2639 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC25B0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC09C9 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9BAC102D Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|