Edit tour
Windows
Analysis Report
Payment Copy #190922-001.exe
Overview
General Information
Detection
FormBook
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Sigma detected: Xwizard DLL Sideloading
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Creates a process in suspended mode (likely to inject code)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Classification
- System is w11x64_office
- Payment Copy #190922-001.exe (PID: 7888 cmdline:
"C:\Users\ user\Deskt op\Payment Copy #190 922-001.ex e" MD5: 6AD492E20A37CB8AE67231FA9059DF17) - svchost.exe (PID: 8076 cmdline:
"C:\Users\ user\Deskt op\Payment Copy #190 922-001.ex e" MD5: B96D1C078A724E31B6F98CDB999E47F6) - gXhpelxbquSwSp.exe (PID: 6880 cmdline:
"C:\Progra m Files (x 86)\SjWHhx MkjXKcvRvM YoGCQlIgpL reUhhzHngK AzOHobQvtr blPkXufal\ gXhpelxbqu SwSp.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - xwizard.exe (PID: 4828 cmdline:
"C:\Window s\SysWOW64 \xwizard.e xe" MD5: CE6B6D39FDAB5FB8D87953BAEB662132) - firefox.exe (PID: 6060 cmdline:
"C:\Progra m Files\Mo zilla Fire fox\Firefo x.exe" MD5: 4E82C81BC54B7858AA507CA58D0E3FA2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Formbook, Formbo | FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Christian Burkard (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T13:18:12.563243+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.24 | 49777 | 103.23.149.28 | 80 | TCP |
2024-12-13T13:18:37.445528+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.24 | 49788 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:52.731892+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.24 | 49792 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:19:08.144035+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.24 | 49796 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:23.813931+0100 | 2855465 | 1 | A Network Trojan was detected | 192.168.2.24 | 49803 | 199.59.243.227 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T13:18:29.342602+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49781 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:32.027554+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49785 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:33.730010+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49786 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:44.629294+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49789 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:18:47.329255+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49790 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:18:48.604997+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49791 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:19:00.074872+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49793 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:02.748122+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49794 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:04.476937+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49795 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:15.104234+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49797 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:17.766303+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49799 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:19.611952+0100 | 2855464 | 1 | A Network Trojan was detected | 192.168.2.24 | 49801 | 199.59.243.227 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | String found in binary or memory: | memstr_995c5625-1 | |
Source: | String found in binary or memory: | memstr_daa25851-b | |
Source: | String found in binary or memory: | memstr_57da8167-f | |
Source: | String found in binary or memory: | memstr_08cfe792-f |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtTerminateThread: | Jump to behavior | ||
Source: | NtReadVirtualMemory: | Jump to behavior | ||
Source: | NtResumeThread: | Jump to behavior | ||
Source: | NtMapViewOfSection: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior | ||
Source: | NtReadFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationProcess: | Jump to behavior | ||
Source: | NtOpenKeyEx: | Jump to behavior | ||
Source: | NtUnmapViewOfSection: | Jump to behavior | ||
Source: | NtQueryVolumeInformationFile: | Jump to behavior | ||
Source: | NtQueryInformationToken: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtCreateKey: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtResumeThread: | Jump to behavior | ||
Source: | NtOpenSection: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtDeviceIoControlFile: | Jump to behavior | ||
Source: | NtQueryAttributesFile: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtCreateUserProcess: | Jump to behavior | ||
Source: | NtDelayExecution: | Jump to behavior | ||
Source: | NtOpenKeyEx: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtNotifyChangeKey: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 312 Process Injection | 2 Virtualization/Sandbox Evasion | 1 OS Credential Dumping | 111 Security Software Discovery | Remote Services | 1 Email Collection | 3 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 312 Process Injection | LSASS Memory | 2 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Data from Local System | 4 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 Abuse Elevation Control Mechanism | Security Account Manager | 2 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
37% | ReversingLabs | Win32.Trojan.AutoitInject | ||
100% | Joe Sandbox ML |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | phishing | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | phishing | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.y6h6kn.top | 103.23.149.28 | true | true | unknown | |
94950.bodis.com | 199.59.243.227 | true | false | high | |
www.deadshoy.tech | 199.59.243.227 | true | true | unknown | |
www.telepzow.fit | 172.67.155.214 | true | true | unknown | |
thesnusgang.fun | 84.32.84.32 | true | true | unknown | |
www.thesnusgang.fun | unknown | unknown | false | unknown | |
www.dnft.immo | unknown | unknown | false | unknown | |
srtb.msn.com | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.23.149.28 | www.y6h6kn.top | unknown | 131349 | DIGINET-AS-VNDigitaltelecomminicationservicejointstock | true | |
172.67.155.214 | www.telepzow.fit | United States | 13335 | CLOUDFLARENETUS | true | |
199.59.243.227 | 94950.bodis.com | United States | 395082 | BODIS-NJUS | false | |
84.32.84.32 | thesnusgang.fun | Lithuania | 33922 | NTT-LT-ASLT | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1574653 |
Start date and time: | 2024-12-13 13:16:21 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 12s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09 |
Run name: | Potential for more IOCs and behavior |
Number of analysed new started processes analysed: | 32 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 1 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Payment Copy #190922-001.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/3@7/4 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, SIHClient.exe, appidcertstorecheck.exe, conhost.exe, backgroundTaskHost.exe
- Excluded IPs from analysis (whitelisted): 204.79.197.203, 23.44.201.36, 4.175.87.197, 20.150.78.196, 20.190.177.149
- Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, chrome.cloudflare-dns.com, client.wns.windows.com, slscr.update.microsoft.com, a-0003.a-msedge.net, ctldl.windowsupdate.com, www-msn-com.a-0003.a-msedge.net, cxcs.microsoft.net, aefd.nelreports.net, weathermapdata.blob.core.windows.net, x1.c.lencr.org, login.live.com, th.bing.com, c.pki.goog
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- VT rate limit hit for: Payment Copy #190922-001.exe
Time | Type | Description |
---|---|---|
07:18:33 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.155.214 | Get hash | malicious | Phisher | Browse | ||
199.59.243.227 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
84.32.84.32 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
94950.bodis.com | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
www.telepzow.fit | Get hash | malicious | FormBook | Browse |
| |
www.y6h6kn.top | Get hash | malicious | FormBook | Browse |
| |
www.deadshoy.tech | Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NTT-LT-ASLT | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Flesh Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher, TechSupportScam | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | TechSupportScam | Browse |
| ||
DIGINET-AS-VNDigitaltelecomminicationservicejointstock | Get hash | malicious | Unknown | Browse |
| |
BODIS-NJUS | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\Payment Copy #190922-001.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 287232 |
Entropy (8bit): | 7.993766009454213 |
Encrypted: | true |
SSDEEP: | 6144:6C+fRuxSJlsJ21eOGekDZhjvJAJ/JJAL19op8/TLh2AJ9trtg:U5sROGekHzJA3yvCwTLhjJ9Xg |
MD5: | F8F104B847CE08C8D2DE8DE58CCBE942 |
SHA1: | A74D19F99A4A1A196BE0F5BFBCE5F6FC153FAC30 |
SHA-256: | 431F60B2EB8C660E1224D2BE82EB3CBFAE4F7B824FE7B2A44DFA67C9D2EEC2A2 |
SHA-512: | CA2787E5199B713E27F5716FFFF70D12433C71EAF60A275415CB9AF90143A6F331DE5D2C1AF3A1158167B6719E5B103D4A085C447199D9C0E76B834D47454CD3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\xwizard.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 120832 |
Entropy (8bit): | 1.2217911962382482 |
Encrypted: | false |
SSDEEP: | 192:U24ZY9FIH9pgXn0T+MbMHBddqqZKWAWF66iVumVe:U2x9Fa9pgn1BrqqZKWh4HVumVe |
MD5: | 71A1F5964AE7880CEAA0C5BDEC3B7296 |
SHA1: | EB1A527D05C1346DF353D3B7CD02D778A11CC3D5 |
SHA-256: | 8204A4BBEF749CAABB7FD7260E0EAFD1DCC05EAC8787AE0782F8909DE3CE07C4 |
SHA-512: | F0DD94C28CA0AB24064AF17EE1753D67E9411F809D9114338B492CD619C428B7AB27E976FC44A35A3D0D76DB640BD5A0F1ABFF64F0DA7168DD259BF0910DA593 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Payment Copy #190922-001.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 287232 |
Entropy (8bit): | 7.993766009454213 |
Encrypted: | true |
SSDEEP: | 6144:6C+fRuxSJlsJ21eOGekDZhjvJAJ/JJAL19op8/TLh2AJ9trtg:U5sROGekHzJA3yvCwTLhjJ9Xg |
MD5: | F8F104B847CE08C8D2DE8DE58CCBE942 |
SHA1: | A74D19F99A4A1A196BE0F5BFBCE5F6FC153FAC30 |
SHA-256: | 431F60B2EB8C660E1224D2BE82EB3CBFAE4F7B824FE7B2A44DFA67C9D2EEC2A2 |
SHA-512: | CA2787E5199B713E27F5716FFFF70D12433C71EAF60A275415CB9AF90143A6F331DE5D2C1AF3A1158167B6719E5B103D4A085C447199D9C0E76B834D47454CD3 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.183063563195928 |
TrID: |
|
File name: | Payment Copy #190922-001.exe |
File size: | 1'201'664 bytes |
MD5: | 6ad492e20a37cb8ae67231fa9059df17 |
SHA1: | 822ee5217bf832a320095b45a65c75d1f147bde8 |
SHA256: | 3c22db2dc305a5605630a009337d6dcf8ed36c132a5269b3fd6146a175813f67 |
SHA512: | 5e2f04f75b6b9c61a435f94fbb36ede8e5e09f3b1d5974c6fb8bfb0e7c6147cd2b1224ab060c3b048a70651b8fe86466e4fe03421bf7a88ddcb4228db93c3461 |
SSDEEP: | 24576:qu6J33O0c+JY5UZ+XC0kGso6FaHH0gQCb3igteIOtOZNFcWY:cu0c++OCvkGs9FaHH0gQCDtvOt+Y |
TLSH: | 5D45CF2273DDC360CB669173BF69B7016EBF7C614630B85B2F880D7DA950162162DBA3 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}. |
Icon Hash: | aaf3e3e3938382a0 |
Entrypoint: | 0x427dcd |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x675AE4F9 [Thu Dec 12 13:28:25 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | afcdf79be1557326c854b6e20cb900a7 |
Instruction |
---|
call 00007F8908EC266Ah |
jmp 00007F8908EB5434h |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
push edi |
push esi |
mov esi, dword ptr [esp+10h] |
mov ecx, dword ptr [esp+14h] |
mov edi, dword ptr [esp+0Ch] |
mov eax, ecx |
mov edx, ecx |
add eax, esi |
cmp edi, esi |
jbe 00007F8908EB55BAh |
cmp edi, eax |
jc 00007F8908EB591Eh |
bt dword ptr [004C31FCh], 01h |
jnc 00007F8908EB55B9h |
rep movsb |
jmp 00007F8908EB58CCh |
cmp ecx, 00000080h |
jc 00007F8908EB5784h |
mov eax, edi |
xor eax, esi |
test eax, 0000000Fh |
jne 00007F8908EB55C0h |
bt dword ptr [004BE324h], 01h |
jc 00007F8908EB5A90h |
bt dword ptr [004C31FCh], 00000000h |
jnc 00007F8908EB575Dh |
test edi, 00000003h |
jne 00007F8908EB576Eh |
test esi, 00000003h |
jne 00007F8908EB574Dh |
bt edi, 02h |
jnc 00007F8908EB55BFh |
mov eax, dword ptr [esi] |
sub ecx, 04h |
lea esi, dword ptr [esi+04h] |
mov dword ptr [edi], eax |
lea edi, dword ptr [edi+04h] |
bt edi, 03h |
jnc 00007F8908EB55C3h |
movq xmm1, qword ptr [esi] |
sub ecx, 08h |
lea esi, dword ptr [esi+08h] |
movq qword ptr [edi], xmm1 |
lea edi, dword ptr [edi+08h] |
test esi, 00000007h |
je 00007F8908EB5615h |
bt esi, 03h |
jnc 00007F8908EB5668h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xba44c | 0x17c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc7000 | 0x5cc58 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x124000 | 0x711c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x92bc0 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xa4870 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8f000 | 0x884 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x8dcc4 | 0x8de00 | d28a820a1d9ff26cda02d12b888ba4b4 | False | 0.5728679102422908 | data | 6.676118058520316 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8f000 | 0x2e10e | 0x2e200 | 79b14b254506b0dbc8cd0ad67fb70ad9 | False | 0.33535526761517614 | OpenPGP Public Key | 5.76010872795207 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xbe000 | 0x8f74 | 0x5200 | 9f9d6f746f1a415a63de45f8b7983d33 | False | 0.1017530487804878 | data | 1.198745897703538 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xc7000 | 0x5cc58 | 0x5ce00 | a8c720a710d1263dc396eea8c91f9907 | False | 0.9287359101615074 | data | 7.897398953683963 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x124000 | 0x711c | 0x7200 | 6fcae3cbbf6bfbabf5ec5bbe7cf612c3 | False | 0.7650767543859649 | data | 6.779031650454199 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc75a8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.7466216216216216 |
RT_ICON | 0xc76d0 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colors | English | Great Britain | 0.3277027027027027 |
RT_ICON | 0xc77f8 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 192 | English | Great Britain | 0.3885135135135135 |
RT_ICON | 0xc7920 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | Great Britain | 0.3333333333333333 |
RT_ICON | 0xc7c08 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | Great Britain | 0.5 |
RT_ICON | 0xc7d30 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | Great Britain | 0.2835820895522388 |
RT_ICON | 0xc8bd8 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | Great Britain | 0.37906137184115524 |
RT_ICON | 0xc9480 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | Great Britain | 0.23699421965317918 |
RT_ICON | 0xc99e8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | Great Britain | 0.13858921161825727 |
RT_ICON | 0xcbf90 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | Great Britain | 0.25070356472795496 |
RT_ICON | 0xcd038 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | Great Britain | 0.3173758865248227 |
RT_MENU | 0xcd4a0 | 0x50 | data | English | Great Britain | 0.9 |
RT_STRING | 0xcd4f0 | 0x594 | data | English | Great Britain | 0.3333333333333333 |
RT_STRING | 0xcda84 | 0x68a | data | English | Great Britain | 0.2747909199522103 |
RT_STRING | 0xce110 | 0x490 | data | English | Great Britain | 0.3715753424657534 |
RT_STRING | 0xce5a0 | 0x5fc | data | English | Great Britain | 0.3087467362924282 |
RT_STRING | 0xceb9c | 0x65c | data | English | Great Britain | 0.34336609336609336 |
RT_STRING | 0xcf1f8 | 0x466 | data | English | Great Britain | 0.3605683836589698 |
RT_STRING | 0xcf660 | 0x158 | Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0 | English | Great Britain | 0.502906976744186 |
RT_RCDATA | 0xcf7b8 | 0x53f1d | data | 1.0003228273862323 | ||
RT_GROUP_ICON | 0x1236d8 | 0x76 | data | English | Great Britain | 0.6610169491525424 |
RT_GROUP_ICON | 0x123750 | 0x14 | data | English | Great Britain | 1.25 |
RT_GROUP_ICON | 0x123764 | 0x14 | data | English | Great Britain | 1.15 |
RT_GROUP_ICON | 0x123778 | 0x14 | data | English | Great Britain | 1.25 |
RT_VERSION | 0x12378c | 0xdc | data | English | Great Britain | 0.6181818181818182 |
RT_MANIFEST | 0x123868 | 0x3ef | ASCII text, with CRLF line terminators | English | Great Britain | 0.5074478649453823 |
DLL | Import |
---|---|
WSOCK32.dll | WSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect |
VERSION.dll | GetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW |
WINMM.dll | timeGetTime, waveOutSetVolume, mciSendStringW |
COMCTL32.dll | ImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create |
MPR.dll | WNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W |
WININET.dll | InternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW |
PSAPI.DLL | GetProcessMemoryInfo |
IPHLPAPI.DLL | IcmpCreateFile, IcmpCloseHandle, IcmpSendEcho |
USERENV.dll | DestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW |
UxTheme.dll | IsThemeActive |
KERNEL32.dll | DuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA |
USER32.dll | AdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW |
GDI32.dll | StrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath |
COMDLG32.dll | GetOpenFileNameW, GetSaveFileNameW |
ADVAPI32.dll | GetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW |
SHELL32.dll | DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish |
ole32.dll | CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity |
OLEAUT32.dll | LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | Great Britain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-13T13:18:12.563243+0100 | 2855465 | ETPRO MALWARE FormBook CnC Checkin (GET) M2 | 1 | 192.168.2.24 | 49777 | 103.23.149.28 | 80 | TCP |
2024-12-13T13:18:29.342602+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49781 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:32.027554+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49785 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:33.730010+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49786 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:37.445528+0100 | 2855465 | ETPRO MALWARE FormBook CnC Checkin (GET) M2 | 1 | 192.168.2.24 | 49788 | 84.32.84.32 | 80 | TCP |
2024-12-13T13:18:44.629294+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49789 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:18:47.329255+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49790 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:18:48.604997+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49791 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:18:52.731892+0100 | 2855465 | ETPRO MALWARE FormBook CnC Checkin (GET) M2 | 1 | 192.168.2.24 | 49792 | 172.67.155.214 | 80 | TCP |
2024-12-13T13:19:00.074872+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49793 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:02.748122+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49794 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:04.476937+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49795 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:08.144035+0100 | 2855465 | ETPRO MALWARE FormBook CnC Checkin (GET) M2 | 1 | 192.168.2.24 | 49796 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:15.104234+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49797 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:17.766303+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49799 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:19.611952+0100 | 2855464 | ETPRO MALWARE FormBook CnC Checkin (POST) M3 | 1 | 192.168.2.24 | 49801 | 199.59.243.227 | 80 | TCP |
2024-12-13T13:19:23.813931+0100 | 2855465 | ETPRO MALWARE FormBook CnC Checkin (GET) M2 | 1 | 192.168.2.24 | 49803 | 199.59.243.227 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 13, 2024 13:18:10.853281975 CET | 49777 | 80 | 192.168.2.24 | 103.23.149.28 |
Dec 13, 2024 13:18:10.973632097 CET | 80 | 49777 | 103.23.149.28 | 192.168.2.24 |
Dec 13, 2024 13:18:10.973752975 CET | 49777 | 80 | 192.168.2.24 | 103.23.149.28 |
Dec 13, 2024 13:18:10.985869884 CET | 49777 | 80 | 192.168.2.24 | 103.23.149.28 |
Dec 13, 2024 13:18:11.105835915 CET | 80 | 49777 | 103.23.149.28 | 192.168.2.24 |
Dec 13, 2024 13:18:12.562987089 CET | 80 | 49777 | 103.23.149.28 | 192.168.2.24 |
Dec 13, 2024 13:18:12.563091040 CET | 80 | 49777 | 103.23.149.28 | 192.168.2.24 |
Dec 13, 2024 13:18:12.563242912 CET | 49777 | 80 | 192.168.2.24 | 103.23.149.28 |
Dec 13, 2024 13:18:12.567729950 CET | 49777 | 80 | 192.168.2.24 | 103.23.149.28 |
Dec 13, 2024 13:18:12.687436104 CET | 80 | 49777 | 103.23.149.28 | 192.168.2.24 |
Dec 13, 2024 13:18:28.121227980 CET | 49781 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:28.241050959 CET | 80 | 49781 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:28.243556023 CET | 49781 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:28.271305084 CET | 49781 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:28.392421007 CET | 80 | 49781 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:29.342545033 CET | 80 | 49781 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:29.342602015 CET | 49781 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:29.781531096 CET | 49781 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:29.901572943 CET | 80 | 49781 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:30.806364059 CET | 49785 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:30.926476955 CET | 80 | 49785 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:30.926592112 CET | 49785 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:30.945507050 CET | 49785 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:31.065479040 CET | 80 | 49785 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:32.027436018 CET | 80 | 49785 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:32.027554035 CET | 49785 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:32.455411911 CET | 49785 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:32.575212955 CET | 80 | 49785 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.471445084 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.592283010 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.594007015 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.608782053 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.729629993 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729666948 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729695082 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729747057 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729774952 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729962111 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.729993105 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.730010033 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.730117083 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.730194092 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.730257988 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.730284929 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.730423927 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.850111008 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.850155115 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.850183964 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.850193977 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.850233078 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.850239038 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.850250959 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.850294113 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:33.850753069 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.850795984 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:33.890871048 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:34.019323111 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:34.692732096 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:34.692827940 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:35.142658949 CET | 49786 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:35.262727976 CET | 80 | 49786 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:36.157857895 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:36.278362036 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:36.278579950 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:36.288033009 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:36.407958031 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445281982 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445369005 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445426941 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445461988 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445497990 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445530891 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445528030 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.445569038 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445585012 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.445602894 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445610046 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.445640087 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445652962 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.445673943 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:37.445775032 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.462639093 CET | 49788 | 80 | 192.168.2.24 | 84.32.84.32 |
Dec 13, 2024 13:18:37.582732916 CET | 80 | 49788 | 84.32.84.32 | 192.168.2.24 |
Dec 13, 2024 13:18:42.983072996 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:43.103749037 CET | 80 | 49789 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:43.103847027 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:43.127372026 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:43.247188091 CET | 80 | 49789 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:44.629293919 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:44.714015961 CET | 80 | 49789 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:44.714637041 CET | 80 | 49789 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:44.714750051 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:44.714778900 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:44.749164104 CET | 80 | 49789 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:44.749900103 CET | 49789 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:45.656414986 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:45.776310921 CET | 80 | 49790 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:45.776510000 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:45.816857100 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:45.936892986 CET | 80 | 49790 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:47.329255104 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:47.379065037 CET | 80 | 49790 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:47.379159927 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:47.379254103 CET | 80 | 49790 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:47.379306078 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:47.449363947 CET | 80 | 49790 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:47.449476004 CET | 49790 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.341885090 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.461997032 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.462249994 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.484707117 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.604863882 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.604912996 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.604994059 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.604996920 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605024099 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605051041 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605077028 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605077982 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605104923 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605110884 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605125904 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605155945 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605159044 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605186939 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605212927 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.605221987 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605237007 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.605261087 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.725231886 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725272894 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725356102 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.725385904 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725415945 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725469112 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725497007 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.725547075 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:48.766958952 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:48.887044907 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:49.997337103 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:50.117885113 CET | 80 | 49791 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:50.118001938 CET | 49791 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:51.015155077 CET | 49792 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:51.134999037 CET | 80 | 49792 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:51.135248899 CET | 49792 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:51.145190001 CET | 49792 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:51.265666962 CET | 80 | 49792 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:52.731097937 CET | 80 | 49792 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:52.731813908 CET | 80 | 49792 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:52.731892109 CET | 49792 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:52.736078024 CET | 49792 | 80 | 192.168.2.24 | 172.67.155.214 |
Dec 13, 2024 13:18:52.856043100 CET | 80 | 49792 | 172.67.155.214 | 192.168.2.24 |
Dec 13, 2024 13:18:58.858266115 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:18:58.978131056 CET | 80 | 49793 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:18:58.978265047 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:18:58.996330023 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:18:59.116588116 CET | 80 | 49793 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:00.074666977 CET | 80 | 49793 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:00.074754000 CET | 80 | 49793 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:00.074773073 CET | 80 | 49793 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:00.074872017 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:00.076297998 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:00.511780024 CET | 49793 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:01.521393061 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:01.641305923 CET | 80 | 49794 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:01.641459942 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:01.662595987 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:01.783415079 CET | 80 | 49794 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:02.747889042 CET | 80 | 49794 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:02.747917891 CET | 80 | 49794 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:02.747939110 CET | 80 | 49794 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:02.748121977 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:02.748121977 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:03.186918020 CET | 49794 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.216978073 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.338141918 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.338263035 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.356589079 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.476762056 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476785898 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476799965 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476813078 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476843119 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476855993 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476870060 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476896048 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476907969 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.476937056 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.477005959 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.596522093 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.596688032 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.596976042 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.597007036 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.597042084 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.597042084 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.597057104 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.597084999 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.597115040 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.597167969 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:04.597245932 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.597276926 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.639204025 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:04.759457111 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:05.742974997 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:05.743029118 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:05.743072033 CET | 80 | 49795 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:05.743145943 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:05.743195057 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:05.875988960 CET | 49795 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:06.925023079 CET | 49796 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:07.045919895 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:07.046058893 CET | 49796 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:07.058255911 CET | 49796 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:07.178236008 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:08.143765926 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:08.143809080 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:08.143826962 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:08.144035101 CET | 49796 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:08.147918940 CET | 49796 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:08.267827034 CET | 80 | 49796 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:13.883632898 CET | 49797 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:14.003627062 CET | 80 | 49797 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:14.003721952 CET | 49797 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:14.020610094 CET | 49797 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:14.140683889 CET | 80 | 49797 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:15.100106955 CET | 80 | 49797 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:15.100208044 CET | 80 | 49797 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:15.100220919 CET | 80 | 49797 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:15.104233980 CET | 49797 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:15.530750036 CET | 49797 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:16.549424887 CET | 49799 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:16.669254065 CET | 80 | 49799 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:16.669336081 CET | 49799 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:16.684420109 CET | 49799 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:16.804214001 CET | 80 | 49799 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:17.765785933 CET | 80 | 49799 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:17.765820026 CET | 80 | 49799 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:17.765862942 CET | 80 | 49799 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:17.766303062 CET | 49799 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:18.325392962 CET | 49799 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.350744963 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.470844984 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.475116014 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.491897106 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.611835003 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.611903906 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.611913919 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.611952066 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.611991882 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612026930 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.612030983 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612148046 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612158060 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612180948 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.612238884 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.612248898 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612267017 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612319946 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.612441063 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.731861115 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.731885910 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.731955051 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.731969118 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.731981039 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.732002974 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.732019901 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.732157946 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:19.774883986 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:19.898953915 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:20.875353098 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:20.875376940 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:20.875432968 CET | 80 | 49801 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:20.875518084 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:20.875576973 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:21.583723068 CET | 49801 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:22.591777086 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:22.711689949 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:22.715290070 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:22.728226900 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:22.848022938 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:23.813772917 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:23.813800097 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:23.813930988 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:23.814110041 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Dec 13, 2024 13:19:23.814157009 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:23.817579031 CET | 49803 | 80 | 192.168.2.24 | 199.59.243.227 |
Dec 13, 2024 13:19:23.937331915 CET | 80 | 49803 | 199.59.243.227 | 192.168.2.24 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 13, 2024 13:17:13.335721970 CET | 62352 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:09.822336912 CET | 61972 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:10.818830967 CET | 61972 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:10.846395016 CET | 53 | 61972 | 1.1.1.1 | 192.168.2.24 |
Dec 13, 2024 13:18:10.957381010 CET | 53 | 61972 | 1.1.1.1 | 192.168.2.24 |
Dec 13, 2024 13:18:27.604931116 CET | 58273 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:28.116338968 CET | 53 | 58273 | 1.1.1.1 | 192.168.2.24 |
Dec 13, 2024 13:18:42.488060951 CET | 53075 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:42.980770111 CET | 53 | 53075 | 1.1.1.1 | 192.168.2.24 |
Dec 13, 2024 13:18:58.116925001 CET | 58273 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:18:58.855814934 CET | 53 | 58273 | 1.1.1.1 | 192.168.2.24 |
Dec 13, 2024 13:19:13.174992085 CET | 53075 | 53 | 192.168.2.24 | 1.1.1.1 |
Dec 13, 2024 13:19:13.880259037 CET | 53 | 53075 | 1.1.1.1 | 192.168.2.24 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 13, 2024 13:17:13.335721970 CET | 192.168.2.24 | 1.1.1.1 | 0x17d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:18:09.822336912 CET | 192.168.2.24 | 1.1.1.1 | 0xe1d9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:18:10.818830967 CET | 192.168.2.24 | 1.1.1.1 | 0xe1d9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:18:27.604931116 CET | 192.168.2.24 | 1.1.1.1 | 0xa9a1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:18:42.488060951 CET | 192.168.2.24 | 1.1.1.1 | 0x3c4d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:18:58.116925001 CET | 192.168.2.24 | 1.1.1.1 | 0x95ef | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 13, 2024 13:19:13.174992085 CET | 192.168.2.24 | 1.1.1.1 | 0x6f28 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 13, 2024 13:17:13.473829985 CET | 1.1.1.1 | 192.168.2.24 | 0x17d | No error (0) | www.msn.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 13, 2024 13:17:13.473829985 CET | 1.1.1.1 | 192.168.2.24 | 0x17d | No error (0) | www-msn-com.a-0003.a-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:10.846395016 CET | 1.1.1.1 | 192.168.2.24 | 0xe1d9 | No error (0) | 103.23.149.28 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:10.846395016 CET | 1.1.1.1 | 192.168.2.24 | 0xe1d9 | No error (0) | 162.251.95.62 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:10.957381010 CET | 1.1.1.1 | 192.168.2.24 | 0xe1d9 | No error (0) | 103.23.149.28 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:10.957381010 CET | 1.1.1.1 | 192.168.2.24 | 0xe1d9 | No error (0) | 162.251.95.62 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:28.116338968 CET | 1.1.1.1 | 192.168.2.24 | 0xa9a1 | No error (0) | thesnusgang.fun | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:28.116338968 CET | 1.1.1.1 | 192.168.2.24 | 0xa9a1 | No error (0) | 84.32.84.32 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:42.980770111 CET | 1.1.1.1 | 192.168.2.24 | 0x3c4d | No error (0) | 172.67.155.214 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:42.980770111 CET | 1.1.1.1 | 192.168.2.24 | 0x3c4d | No error (0) | 104.21.64.208 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:58.855814934 CET | 1.1.1.1 | 192.168.2.24 | 0x95ef | No error (0) | 94950.bodis.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 13, 2024 13:18:58.855814934 CET | 1.1.1.1 | 192.168.2.24 | 0x95ef | No error (0) | 199.59.243.227 | A (IP address) | IN (0x0001) | false | ||
Dec 13, 2024 13:19:13.880259037 CET | 1.1.1.1 | 192.168.2.24 | 0x6f28 | No error (0) | 199.59.243.227 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.24 | 49777 | 103.23.149.28 | 80 | 6880 | C:\Program Files (x86)\SjWHhxMkjXKcvRvMYoGCQlIgpLreUhhzHngKAzOHobQvtrblPkXufal\gXhpelxbquSwSp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 13, 2024 13:18:10.985869884 CET | 438 | OUT | |
Dec 13, 2024 13:18:12.562987089 CET | 312 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.24 | 49781 | 84.32.84.32 | 80 | 6880 | C:\Program Files (x86)\SjWHhxMkjXKcvRvMYoGCQlIgpLreUhhzHngKAzOHobQvtrblPkXufal\gXhpelxbquSwSp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 13, 2024 13:18:28.271305084 CET | 719 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.24 | 49785 | 84.32.84.32 | 80 | 6880 | C:\Program Files (x86)\SjWHhxMkjXKcvRvMYoGCQlIgpLreUhhzHngKAzOHobQvtrblPkXufal\gXhpelxbquSwSp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 13, 2024 13:18:30.945507050 CET | 1091 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.24 | 49786 | 84.32.84.32 | 80 | 6880 | C:\Program Files (x86)\SjWHhxMkjXKcvRvMYoGCQlIgpLreUhhzHngKAzOHobQvtrblPkXufal\gXhpelxbquSwSp.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 13, 2024 13:18:33.608782053 CET | 12360 | OUT |