Windows
Analysis Report
b.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- b.exe (PID: 7648 cmdline:
"C:\Users\ user\Deskt op\b.exe" MD5: 1D08526FC81B1D62195F4E5DEA52BB6F) - conhost.exe (PID: 7656 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - aspnet_regiis.exe (PID: 7728 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 7840 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 648 -s 122 8 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
{"C2 url": ["revirepart.biz"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:01.670163+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:03.908693+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:05.901261+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:08.400820+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:11.575585+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:13.846176+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:16.603881+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:18.738157+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:21.447907+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49749 | 104.21.88.250 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:02.355799+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:04.617752+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:06.597888+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:22.151291+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 104.21.88.250 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:02.355799+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:04.617752+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:06.597888+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:01.670163+0100 | 2057647 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:00.042087+0100 | 2057646 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 56745 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:20.152926+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49747 | 104.21.88.250 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 2_2_0245A4DA |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0089F880 | |
Source: | Code function: | 0_2_008AF670 | |
Source: | Code function: | 0_2_0089AF10 | |
Source: | Code function: | 0_2_008C4940 | |
Source: | Code function: | 0_2_008C4370 | |
Source: | Code function: | 2_2_02449AE0 | |
Source: | Code function: | 2_2_02449AE0 | |
Source: | Code function: | 2_2_0244DA8D | |
Source: | Code function: | 2_2_02482B00 | |
Source: | Code function: | 2_2_0246F3ED | |
Source: | Code function: | 2_2_0246E398 | |
Source: | Code function: | 2_2_0246EB98 | |
Source: | Code function: | 2_2_024590D0 | |
Source: | Code function: | 2_2_0244B97E | |
Source: | Code function: | 2_2_024827D0 | |
Source: | Code function: | 2_2_0244AD50 | |
Source: | Code function: | 2_2_02482530 | |
Source: | Code function: | 2_2_0244C5BE | |
Source: | Code function: | 2_2_0245DA40 | |
Source: | Code function: | 2_2_02483260 | |
Source: | Code function: | 2_2_02444A31 | |
Source: | Code function: | 2_2_0247DAC0 | |
Source: | Code function: | 2_2_0245E2F0 | |
Source: | Code function: | 2_2_0245E2F0 | |
Source: | Code function: | 2_2_0246CAB0 | |
Source: | Code function: | 2_2_0246B340 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0244C303 | |
Source: | Code function: | 2_2_0245BB10 | |
Source: | Code function: | 2_2_0245FB20 | |
Source: | Code function: | 2_2_0245FB20 | |
Source: | Code function: | 2_2_02466BD0 | |
Source: | Code function: | 2_2_02466BD0 | |
Source: | Code function: | 2_2_02466BD0 | |
Source: | Code function: | 2_2_02466BD0 | |
Source: | Code function: | 2_2_0246D040 | |
Source: | Code function: | 2_2_02481860 | |
Source: | Code function: | 2_2_0246E06F | |
Source: | Code function: | 2_2_02447870 | |
Source: | Code function: | 2_2_02447870 | |
Source: | Code function: | 2_2_02442820 | |
Source: | Code function: | 2_2_0246D830 | |
Source: | Code function: | 2_2_0246E039 | |
Source: | Code function: | 2_2_0246A0D5 | |
Source: | Code function: | 2_2_0246E007 | |
Source: | Code function: | 2_2_0246B0FA | |
Source: | Code function: | 2_2_0244F096 | |
Source: | Code function: | 2_2_0244F096 | |
Source: | Code function: | 2_2_024468B0 | |
Source: | Code function: | 2_2_02482970 | |
Source: | Code function: | 2_2_02481930 | |
Source: | Code function: | 2_2_024779E0 | |
Source: | Code function: | 2_2_0244E1EC | |
Source: | Code function: | 2_2_0245FF7F | |
Source: | Code function: | 2_2_02465190 | |
Source: | Code function: | 2_2_0244CE52 | |
Source: | Code function: | 2_2_0244CE52 | |
Source: | Code function: | 2_2_02466E00 | |
Source: | Code function: | 2_2_02466E00 | |
Source: | Code function: | 2_2_02466E00 | |
Source: | Code function: | 2_2_02466E00 | |
Source: | Code function: | 2_2_0246DE10 | |
Source: | Code function: | 2_2_0245F6E0 | |
Source: | Code function: | 2_2_0245F6E0 | |
Source: | Code function: | 2_2_024696F4 | |
Source: | Code function: | 2_2_02466F70 | |
Source: | Code function: | 2_2_02466F70 | |
Source: | Code function: | 2_2_02466F70 | |
Source: | Code function: | 2_2_02466F70 | |
Source: | Code function: | 2_2_0245FF7F | |
Source: | Code function: | 2_2_0244E714 | |
Source: | Code function: | 2_2_0245C7C9 | |
Source: | Code function: | 2_2_0244E7D9 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0246EF87 | |
Source: | Code function: | 2_2_0245BFB6 | |
Source: | Code function: | 2_2_0246D4A0 | |
Source: | Code function: | 2_2_0245DD48 | |
Source: | Code function: | 2_2_0246FD65 | |
Source: | Code function: | 2_2_0246FD65 | |
Source: | Code function: | 2_2_02466510 | |
Source: | Code function: | 2_2_02469520 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 2_2_02475300 |
Source: | Code function: | 2_2_02475300 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_6CDD88C0 | |
Source: | Code function: | 0_2_6CDD6E40 |
Source: | Code function: | 0_2_008BBC80 | |
Source: | Code function: | 0_2_008A3090 | |
Source: | Code function: | 0_2_008A2430 | |
Source: | Code function: | 0_2_008A41A0 | |
Source: | Code function: | 0_2_008BC5A0 | |
Source: | Code function: | 0_2_008BC920 | |
Source: | Code function: | 0_2_008BF550 | |
Source: | Code function: | 0_2_6CDD88C0 | |
Source: | Code function: | 0_2_6CDD6E40 | |
Source: | Code function: | 0_2_6CDD1210 | |
Source: | Code function: | 0_2_6CDDFCB0 | |
Source: | Code function: | 0_2_6CDD4810 | |
Source: | Code function: | 0_2_6CDEA621 | |
Source: | Code function: | 0_2_6CDD7FE0 | |
Source: | Code function: | 0_2_008BDA10 | |
Source: | Code function: | 2_2_0247D260 | |
Source: | Code function: | 2_2_02449AE0 | |
Source: | Code function: | 2_2_0247AAE0 | |
Source: | Code function: | 2_2_0246F3ED | |
Source: | Code function: | 2_2_0246E398 | |
Source: | Code function: | 2_2_02469060 | |
Source: | Code function: | 2_2_02464860 | |
Source: | Code function: | 2_2_024590D0 | |
Source: | Code function: | 2_2_02462110 | |
Source: | Code function: | 2_2_02466618 | |
Source: | Code function: | 2_2_0247A760 | |
Source: | Code function: | 2_2_02482C40 | |
Source: | Code function: | 2_2_02448C70 | |
Source: | Code function: | 2_2_0245A4DA | |
Source: | Code function: | 2_2_0244AD50 | |
Source: | Code function: | 2_2_02483580 | |
Source: | Code function: | 2_2_02465A4A | |
Source: | Code function: | 2_2_02461250 | |
Source: | Code function: | 2_2_02483260 | |
Source: | Code function: | 2_2_02446200 | |
Source: | Code function: | 2_2_02444A31 | |
Source: | Code function: | 2_2_0247DAC0 | |
Source: | Code function: | 2_2_0247E2D0 | |
Source: | Code function: | 2_2_0245E2F0 | |
Source: | Code function: | 2_2_024732F0 | |
Source: | Code function: | 2_2_0244B280 | |
Source: | Code function: | 2_2_02478B4C | |
Source: | Code function: | 2_2_02462360 | |
Source: | Code function: | 2_2_02442B70 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0245BB10 | |
Source: | Code function: | 2_2_0245FB20 | |
Source: | Code function: | 2_2_02466BD0 | |
Source: | Code function: | 2_2_02471BE8 | |
Source: | Code function: | 2_2_02445BF0 | |
Source: | Code function: | 2_2_0245EBF0 | |
Source: | Code function: | 2_2_024813A0 | |
Source: | Code function: | 2_2_02481860 | |
Source: | Code function: | 2_2_02447870 | |
Source: | Code function: | 2_2_02463815 | |
Source: | Code function: | 2_2_0246A0D5 | |
Source: | Code function: | 2_2_0245E0E8 | |
Source: | Code function: | 2_2_024750F0 | |
Source: | Code function: | 2_2_0246B0FA | |
Source: | Code function: | 2_2_0247B0A0 | |
Source: | Code function: | 2_2_0247A0A0 | |
Source: | Code function: | 2_2_024468B0 | |
Source: | Code function: | 2_2_0246C14A | |
Source: | Code function: | 2_2_02481930 | |
Source: | Code function: | 2_2_024729C6 | |
Source: | Code function: | 2_2_0245FF7F | |
Source: | Code function: | 2_2_02479E40 | |
Source: | Code function: | 2_2_02448E50 | |
Source: | Code function: | 2_2_0244CE52 | |
Source: | Code function: | 2_2_02466E00 | |
Source: | Code function: | 2_2_02472615 | |
Source: | Code function: | 2_2_0245F6E0 | |
Source: | Code function: | 2_2_024696F4 | |
Source: | Code function: | 2_2_024496A0 | |
Source: | Code function: | 2_2_02482F40 | |
Source: | Code function: | 2_2_02466F70 | |
Source: | Code function: | 2_2_0245FF7F | |
Source: | Code function: | 2_2_02444F05 | |
Source: | Code function: | 2_2_0247D710 | |
Source: | Code function: | 2_2_0245C7C9 | |
Source: | Code function: | 2_2_024687D0 | |
Source: | Code function: | 2_2_0244E7D9 | |
Source: | Code function: | 2_2_0245EFF5 | |
Source: | Code function: | 2_2_0246EF87 | |
Source: | Code function: | 2_2_0245BFB6 | |
Source: | Code function: | 2_2_0246E7BB | |
Source: | Code function: | 2_2_02465410 | |
Source: | Code function: | 2_2_02470C1C | |
Source: | Code function: | 2_2_02460C90 | |
Source: | Code function: | 2_2_0246FD65 | |
Source: | Code function: | 2_2_02446D60 | |
Source: | Code function: | 2_2_02443570 | |
Source: | Code function: | 2_2_02469520 | |
Source: | Code function: | 2_2_024605F0 | |
Source: | Code function: | 2_2_024455F8 | |
Source: | Code function: | 2_2_0246B588 | |
Source: | Code function: | 2_2_0245B5A1 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 2_2_0247AAE0 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_008674E6 | |
Source: | Code function: | 2_3_028CCF6D |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_0247FAC0 |
Source: | Code function: | 0_2_6CDE160A |
Source: | Code function: | 0_2_6CDE2D95 | |
Source: | Code function: | 0_2_6CDE3F69 |
Source: | Code function: | 0_2_6CDE5B7C |
Source: | Code function: | 0_2_6CDE1131 | |
Source: | Code function: | 0_2_6CDE160A | |
Source: | Code function: | 0_2_6CDE3F9A |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_6CDE17D8 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_6CDE1253 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 13 Virtualization/Sandbox Evasion | LSASS Memory | 151 Security Software Discovery | Remote Desktop Protocol | 31 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 13 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 2 Clipboard Data | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 311 Process Injection | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 4 Obfuscated Files or Information | Cached Domain Credentials | 33 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 12 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | ReversingLabs | Win32.Infostealer.Generic | ||
30% | Virustotal | Browse | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
4% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
20% | Virustotal | Browse | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
frogs-severz.sbs | 104.21.88.250 | true | true |
| unknown |
revirepart.biz | 104.21.43.198 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.43.198 | revirepart.biz | United States | 13335 | CLOUDFLARENETUS | false | |
104.21.88.250 | frogs-severz.sbs | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561391 |
Start date and time: | 2024-11-23 10:24:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | b.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/7@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
04:25:01 | API Interceptor | |
04:25:22 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.43.198 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
revirepart.biz | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
frogs-severz.sbs | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, Credential Flusher, Cryptbot, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_b.exe_6aed87d74fcac5fc678ad6e46e3a3777b5e2266d_f4d35178_8221b3c3-b7a5-460d-93de-9e5b89fe33c7\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9779097537291204 |
Encrypted: | false |
SSDEEP: | 96:tmFNMUsOsHKw5MldvxmoijCQXIDcQvc6QcEVcw3cE/H+BHUHZ0ownOgHkEwH3dEX:InMUsOsYkd0BU/qaGpezuiF1Z24IO8r |
MD5: | 4D8F918F1FDFFFAE24544295023B845D |
SHA1: | 3D87493091C12BA3704BD264D92CDE359EB54BF9 |
SHA-256: | 9057E5BD12CAD2E09B10022521CC3C1A7948E0FD65D55245832AB27700A96711 |
SHA-512: | 49A018E44823EB62AD23453418B303AF19431D5D2F562E7AEFC83CA2D33DE2DD4FDAFF60BEB9A71C2597272E1F27E317840F477A8496777EABB713EE0C29AFC4 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 189946 |
Entropy (8bit): | 3.4636367944781457 |
Encrypted: | false |
SSDEEP: | 1536:VkoqjkrpN4uE2aOvELTgNXFVs2DP/SJlCD4XYWJ0pbjPJPq+9:Vko/D4uEqsLTgCm2w4R0pbtC+ |
MD5: | 138884DBE9668CAAD1292825F17479B5 |
SHA1: | EF351530E1771F876AB19D99E21188499F17095D |
SHA-256: | 71D4BC78D7AF2BB946337967788CF11D0463FED1F9CEC8888ADA9CE034ED59E5 |
SHA-512: | EF6BB2839447FBBA443D7DF20385B3D520D2042CC15FA0780BC949EB54B90B28E84207D26CDC000B22995D26457AD5027CED30AD8339D8D1D34A2C1AE17A9A22 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8386 |
Entropy (8bit): | 3.7042609150357624 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJOA6l6Y9sSUjngmfZUYxfjprQ89bcWsfuLUm:R6lXJZ6l6Y2SUjngmfWY5jc1fud |
MD5: | 1C671253E951F552D5ABCC1C2C3C2093 |
SHA1: | ADB38A4070FBE54F762ECEFB389408FB440F3F5C |
SHA-256: | 31308B3F2C28FCA85F365734DE55A4B9EF8604DCE24CE3456FD724994D874CEB |
SHA-512: | F0A44EE5B6E7B80013178E7443C774EF63C1BE3E72792278E29E5FFFF1F35EB9C73FDA9BB919CD2BBCB3689547BD8D47335C9AF3FF9720CBA9126A6C04AE43B4 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4737 |
Entropy (8bit): | 4.500871348874029 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsaJg77aI98kqWpW8VYq0Ym8M4Jx2FIk+q8vlpqyN7npOd:uIjfoI77L7VFJgKGopOd |
MD5: | 1A27D0C3E875B6BFDF9A083AF01A5707 |
SHA1: | 1DB0C9261DDDB1E35E4BD43E5252ED97FFDD5E25 |
SHA-256: | 8CC8DCA8E072A8B273F2C711AAC7ABD22B2554F54EB550220F7419F89C1EEDDE |
SHA-512: | 4D227A0C0E6C286B53DB64A20FA1154AAF9E6A9181B08E89580D4E6FDB3D6D90097753875151C595490DF51C65439B63A2EF165DD0E11BD739D5B31D19B6A5DE |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\b.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 462848 |
Entropy (8bit): | 7.1257309071219375 |
Encrypted: | false |
SSDEEP: | 12288:aklrtKjg1YBxbVonQXhT0doOFdNreYw3ZJyNnFJ/tPZirx1XTY6jyPCMIExFqJoL:DvKjKYBxbVonQXhT0doOFdNreYw3ZJyO |
MD5: | EBC77EA19ED66BC10494A862C694C4D7 |
SHA1: | BB27DD01C052598DE09C5460FE241CB61BE86DE1 |
SHA-256: | 1287FC59877EDEABFCCCDCB48ADCC0D626A12A4F466F496551859ACD5E8E95C2 |
SHA-512: | 32EAE184B9E13D4501226A24C28EB368ED783662358E2642AD210DD7542F6AF66753554F63EB71292A9238EBBDC4B1FC02F6E9C376584DB6B72E100B8C345F81 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465916496289131 |
Encrypted: | false |
SSDEEP: | 6144:wIXfpi67eLPU9skLmb0b4NWSPKaJG8nAgejZMMhA2gX4WABl0uNSdwBCswSbs:VXD94NWlLZMM6YFHY+s |
MD5: | 92F78B2AB1B72F32F21A4F36858FF709 |
SHA1: | 0D425F12BFE278C953CC5A3B637C57F1C7C1122C |
SHA-256: | F14E9D52AFCBE72EC283E32C567990E93C0CE053FBE3DEB881D8174EA4FB8C0F |
SHA-512: | FF86D0F4E22E2A032F63A6893DCFCDD94F2B819EF7AB4CF3BDB2F8756552F90F55AE775BCE379FF9F8D92E2381B54F2D98DEC8EAA56B6C4AC24FC6A41F44EB0A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\b.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1411 |
Entropy (8bit): | 4.539958446792231 |
Encrypted: | false |
SSDEEP: | 24:7v74NuayMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4jyMff2p8p14nrPKktp |
MD5: | 7548DE235C6FF508119DBDAFE31226A0 |
SHA1: | 9AF86E79C82BF0D0C3D7145DA7A41AAAD2E2F90C |
SHA-256: | F7281B8DFBA6ADD95C1606327A1DC2E29D748FD680215E825F3BC756F5683BDF |
SHA-512: | 712C158DFD4CABAB490D42F04CE2A8C815D92B8A1BD591A7C3CC26DB41AB93902C13590B6F9353B183D47C3EB20AF9124788557E843719DD36DFF283C0B07E4D |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.765253938991967 |
TrID: |
|
File name: | b.exe |
File size: | 716'800 bytes |
MD5: | 1d08526fc81b1d62195f4e5dea52bb6f |
SHA1: | caeaa9d75af4555ecc6367dd32cd541123c5e5b6 |
SHA256: | 5af91198860f878466493a6d92481fcc88d59a182cec02812ce6b3dcd1f0fa38 |
SHA512: | 0ca26f2932933b4341d21e62873a818af13f4ab838da9a5274ebf5c5aa48653f3675ee805232aa31703e99b8adadebff9af9b78b59158a68e3d792c0d8070c62 |
SSDEEP: | 12288:lhQGkvIZqiNSyk5IztFOZNzrn9fgkkAxjFS10dNy81Dtdd9am6wjYJ6OwUkXoK5b:lhQVJuINzrn53px5ndsGrdn6 |
TLSH: | 50E48D9C766072EFC867D472DEA81CB4EA5074BB971F4207A02706AD9E1D88BCF150F6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r.@g..............0..............`... ... ....@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4b600a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6740A872 [Fri Nov 22 15:51:14 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [004B6000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x926f4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xb2000 | 0x640 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xb4000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb6000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x92000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
m@ka | 0x2000 | 0x8ef5c | 0x8f000 | b33644dca1db622a0eeec01488cbaf72 | False | 1.0003175535402098 | data | 7.999658471887131 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x92000 | 0x1ef80 | 0x1f000 | d818b86ae86d7715e48499313b884147 | False | 0.3296764742943548 | data | 4.689866894400597 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xb2000 | 0x640 | 0x800 | 6752790ea098d13cb7ab0fcc0109979e | False | 0.35009765625 | data | 3.5595325261658877 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xb4000 | 0xc | 0x200 | 9d7743fe20d48f4946db51a87cf62226 | False | 0.044921875 | data | 0.09800417566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
0xb6000 | 0x10 | 0x200 | a93ef1ee99c8d5918b18fcaa9159b379 | False | 0.044921875 | data | 0.14263576814887827 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xb20a0 | 0x3b4 | data | 0.43248945147679324 | ||
RT_MANIFEST | 0xb2454 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T10:25:00.042087+0100 | 2057646 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (revirepart .biz) | 1 | 192.168.2.4 | 56745 | 1.1.1.1 | 53 | UDP |
2024-11-23T10:25:01.670163+0100 | 2057647 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (revirepart .biz in TLS SNI) | 1 | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:01.670163+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:02.355799+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:02.355799+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | TCP |
2024-11-23T10:25:03.908693+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:04.617752+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:04.617752+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:05.901261+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:06.597888+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:06.597888+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:08.400820+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:11.575585+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:13.846176+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:16.603881+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:18.738157+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:20.152926+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49747 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:21.447907+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49749 | 104.21.88.250 | 443 | TCP |
2024-11-23T10:25:22.151291+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49749 | 104.21.88.250 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 10:25:00.356985092 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:00.357043028 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:00.357125044 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:00.361007929 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:00.361027956 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:01.670044899 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:01.670162916 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:01.677969933 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:01.677999020 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:01.678178072 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:01.721828938 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:01.725856066 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:01.725856066 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:01.725940943 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:02.355789900 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:02.355858088 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:02.355910063 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:02.358843088 CET | 49730 | 443 | 192.168.2.4 | 104.21.43.198 |
Nov 23, 2024 10:25:02.358861923 CET | 443 | 49730 | 104.21.43.198 | 192.168.2.4 |
Nov 23, 2024 10:25:02.600756884 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:02.600843906 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:02.600939989 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:02.601265907 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:02.601319075 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:03.908443928 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:03.908693075 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:03.921215057 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:03.921269894 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:03.921463013 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:03.923414946 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:03.923455000 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:03.923490047 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.617729902 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.617789984 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.617855072 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.618025064 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.618066072 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.618093014 CET | 49732 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.618108034 CET | 443 | 49732 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.689454079 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.689534903 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:04.689631939 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.689894915 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:04.689929008 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:05.901159048 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:05.901261091 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:05.902239084 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:05.902249098 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:05.902446985 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:05.908123016 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:05.908144951 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:05.908185005 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.597893000 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.597937107 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.597966909 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.597990990 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.598014116 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.598026037 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.598088980 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.598140955 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.598140955 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.605808020 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.605912924 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.606014013 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.606031895 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.614334106 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.614384890 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.614403963 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.622677088 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.622737885 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.622761011 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.674992085 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.789493084 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.793265104 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.793337107 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.793335915 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.793387890 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.800611973 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.800657034 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:06.800683022 CET | 49734 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:06.800700903 CET | 443 | 49734 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:07.097143888 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:07.097232103 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:07.097327948 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:07.097650051 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:07.097698927 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:08.400733948 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:08.400820017 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:08.402050018 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:08.402076960 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:08.402288914 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:08.409656048 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:08.409841061 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:08.409884930 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:08.409960985 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:08.409979105 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:10.172521114 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:10.172604084 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:10.172668934 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:10.172784090 CET | 49737 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:10.172840118 CET | 443 | 49737 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:10.269525051 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:10.269566059 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:10.269620895 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:10.270113945 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:10.270126104 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:11.575505972 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:11.575584888 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:11.577189922 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:11.577198029 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:11.577404976 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:11.585436106 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:11.585597038 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:11.585628033 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:12.351083994 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:12.351166010 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:12.351340055 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:12.351408005 CET | 49740 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:12.351423979 CET | 443 | 49740 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:12.540808916 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:12.540837049 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:12.540920019 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:12.541270018 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:12.541282892 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:13.846067905 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:13.846175909 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:13.852065086 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:13.852085114 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:13.852267981 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:13.859141111 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:13.859240055 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:13.859276056 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:13.859349966 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:13.859359026 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:14.718240023 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:14.718313932 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:14.718368053 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:14.723893881 CET | 49742 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:14.723916054 CET | 443 | 49742 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:15.297740936 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:15.297837019 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:15.297941923 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:15.298384905 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:15.298417091 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:16.603773117 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:16.603880882 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:16.605113983 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:16.605149031 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:16.605484009 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:16.607104063 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:16.607194901 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:16.607208014 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:17.316509008 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:17.316622972 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:17.316716909 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:17.316848040 CET | 49744 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:17.316888094 CET | 443 | 49744 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:17.434503078 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:17.434545994 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:17.434742928 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:17.435230017 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:17.435245991 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:18.738053083 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:18.738157034 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:18.739310026 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:18.739331007 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:18.739566088 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:18.740592957 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:18.740683079 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:18.740689993 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:20.152298927 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:20.152429104 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:20.152510881 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:20.152630091 CET | 49747 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:20.152647018 CET | 443 | 49747 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:20.188637972 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:20.188680887 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:20.188764095 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:20.189080000 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:20.189102888 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:21.447834969 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:21.447906971 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:21.449721098 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:21.449729919 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:21.450056076 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:21.451354980 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:21.451383114 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:21.451437950 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:22.151319981 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:22.151463032 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:22.151509047 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:22.151844978 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:22.151861906 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Nov 23, 2024 10:25:22.151879072 CET | 49749 | 443 | 192.168.2.4 | 104.21.88.250 |
Nov 23, 2024 10:25:22.151886940 CET | 443 | 49749 | 104.21.88.250 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 10:25:00.042087078 CET | 56745 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 10:25:00.350687981 CET | 53 | 56745 | 1.1.1.1 | 192.168.2.4 |
Nov 23, 2024 10:25:02.369648933 CET | 55435 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 10:25:02.599664927 CET | 53 | 55435 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 23, 2024 10:25:00.042087078 CET | 192.168.2.4 | 1.1.1.1 | 0x9f3e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 23, 2024 10:25:02.369648933 CET | 192.168.2.4 | 1.1.1.1 | 0xee2d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 23, 2024 10:25:00.350687981 CET | 1.1.1.1 | 192.168.2.4 | 0x9f3e | No error (0) | 104.21.43.198 | A (IP address) | IN (0x0001) | false | ||
Nov 23, 2024 10:25:00.350687981 CET | 1.1.1.1 | 192.168.2.4 | 0x9f3e | No error (0) | 172.67.184.174 | A (IP address) | IN (0x0001) | false | ||
Nov 23, 2024 10:25:02.599664927 CET | 1.1.1.1 | 192.168.2.4 | 0xee2d | No error (0) | 104.21.88.250 | A (IP address) | IN (0x0001) | false | ||
Nov 23, 2024 10:25:02.599664927 CET | 1.1.1.1 | 192.168.2.4 | 0xee2d | No error (0) | 172.67.155.47 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.43.198 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:01 UTC | 261 | OUT | |
2024-11-23 09:25:01 UTC | 8 | OUT | |
2024-11-23 09:25:02 UTC | 1011 | IN | |
2024-11-23 09:25:02 UTC | 9 | IN | |
2024-11-23 09:25:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:03 UTC | 263 | OUT | |
2024-11-23 09:25:03 UTC | 8 | OUT | |
2024-11-23 09:25:04 UTC | 1005 | IN | |
2024-11-23 09:25:04 UTC | 7 | IN | |
2024-11-23 09:25:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:05 UTC | 264 | OUT | |
2024-11-23 09:25:05 UTC | 86 | OUT | |
2024-11-23 09:25:06 UTC | 1003 | IN | |
2024-11-23 09:25:06 UTC | 366 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 335 | IN | |
2024-11-23 09:25:06 UTC | 1369 | IN | |
2024-11-23 09:25:06 UTC | 687 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49737 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:08 UTC | 278 | OUT | |
2024-11-23 09:25:08 UTC | 15331 | OUT | |
2024-11-23 09:25:08 UTC | 2815 | OUT | |
2024-11-23 09:25:10 UTC | 1010 | IN | |
2024-11-23 09:25:10 UTC | 19 | IN | |
2024-11-23 09:25:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49740 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:11 UTC | 278 | OUT | |
2024-11-23 09:25:11 UTC | 8773 | OUT | |
2024-11-23 09:25:12 UTC | 1013 | IN | |
2024-11-23 09:25:12 UTC | 19 | IN | |
2024-11-23 09:25:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:13 UTC | 274 | OUT | |
2024-11-23 09:25:13 UTC | 15331 | OUT | |
2024-11-23 09:25:13 UTC | 5065 | OUT | |
2024-11-23 09:25:14 UTC | 1017 | IN | |
2024-11-23 09:25:14 UTC | 19 | IN | |
2024-11-23 09:25:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49744 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:16 UTC | 272 | OUT | |
2024-11-23 09:25:16 UTC | 1248 | OUT | |
2024-11-23 09:25:17 UTC | 1004 | IN | |
2024-11-23 09:25:17 UTC | 19 | IN | |
2024-11-23 09:25:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49747 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:18 UTC | 280 | OUT | |
2024-11-23 09:25:18 UTC | 1140 | OUT | |
2024-11-23 09:25:20 UTC | 1009 | IN | |
2024-11-23 09:25:20 UTC | 19 | IN | |
2024-11-23 09:25:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49749 | 104.21.88.250 | 443 | 7728 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 09:25:21 UTC | 265 | OUT | |
2024-11-23 09:25:21 UTC | 121 | OUT | |
2024-11-23 09:25:22 UTC | 1008 | IN | |
2024-11-23 09:25:22 UTC | 54 | IN | |
2024-11-23 09:25:22 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:24:58 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\Desktop\b.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x860000 |
File size: | 716'800 bytes |
MD5 hash: | 1D08526FC81B1D62195F4E5DEA52BB6F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 04:24:58 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 04:24:58 |
Start date: | 23/11/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x430000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 5 |
Start time: | 04:24:59 |
Start date: | 23/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdf0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 15.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 5.3% |
Total number of Nodes: | 1444 |
Total number of Limit Nodes: | 10 |
Graph
Function 6CDD88C0 Relevance: 102.0, APIs: 27, Strings: 27, Instructions: 7491nativememorythreadCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDD1210 Relevance: 54.4, APIs: 21, Strings: 8, Instructions: 3612filememoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE0E21 Relevance: 3.1, APIs: 2, Instructions: 76COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE5C4D Relevance: 3.1, APIs: 2, Instructions: 67COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE31AD Relevance: 3.0, APIs: 2, Instructions: 31COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008AF670 Relevance: 15.3, Strings: 12, Instructions: 267COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008BC920 Relevance: 10.4, Strings: 8, Instructions: 429COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008A3090 Relevance: 8.4, Strings: 6, Instructions: 857COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDD7FE0 Relevance: 4.4, Strings: 3, Instructions: 663COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0089F880 Relevance: 4.0, Strings: 3, Instructions: 211COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDD4810 Relevance: 3.8, Strings: 1, Instructions: 2574COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE17D8 Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008BF550 Relevance: 1.5, Strings: 1, Instructions: 280COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C4370 Relevance: 1.4, Strings: 1, Instructions: 155COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008C4940 Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE5B7C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008A41A0 Relevance: .7, Instructions: 661COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008A2430 Relevance: .3, Instructions: 286COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008BC5A0 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 008BBC80 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0089AF10 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE3F69 Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE3B33 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE579A Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 77COMMONLIBRARYCODE
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE25E7 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE2763 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE2E1A Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE7437 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE4377 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CDE35A4 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 26% |
Total number of Nodes: | 304 |
Total number of Limit Nodes: | 30 |
Graph
Function 0247AAE0 Relevance: 33.7, APIs: 11, Strings: 8, Instructions: 429memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02448C70 Relevance: 7.6, APIs: 5, Instructions: 148threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0247FAC0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0247D1B0 Relevance: 1.6, APIs: 1, Instructions: 80memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0244A020 Relevance: 1.6, APIs: 1, Instructions: 72libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02473E66 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024725A0 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0244D2E3 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0244D2B0 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0247D196 Relevance: 1.5, APIs: 1, Instructions: 10memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02475300 Relevance: 29.9, APIs: 6, Strings: 11, Instructions: 129clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024745D3 Relevance: 43.9, APIs: 1, Strings: 24, Instructions: 159memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|