Edit tour
Windows
Analysis Report
PO1341489LTB GROUP.vbs
Overview
General Information
Detection
FormBook
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for dropped file
Benign windows process drops PE files
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
VBScript performs obfuscated calls to suspicious functions
Yara detected FormBook
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Found direct / indirect Syscall (likely to bypass EDR)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Potential malicious VBS script found (has network functionality)
Queues an APC in another process (thread injection)
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: AspNetCompiler Execution
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Classification
- System is w10x64
- wscript.exe (PID: 6148 cmdline:
C:\Windows \System32\ WScript.ex e "C:\User s\user\Des ktop\PO134 1489LTB GR OUP.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80) - x.exe (PID: 5796 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\x.exe" MD5: D9A430A4C9B06A9C5F69147498335567) - aspnet_compiler.exe (PID: 6536 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_compil er.exe" MD5: FDA8C8F2A4E100AFB14C13DFCBCAB2D2) - JogKDBeJAc.exe (PID: 6000 cmdline:
"C:\Progra m Files (x 86)\LpktEE EOouwnfKcO SvSCazLlTT qvDTCpPnea XBBgVQwbzB ChAtHAvXhB TVIiYnTAfJ pNSWGFzmOx \JogKDBeJA c.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - chkntfs.exe (PID: 5236 cmdline:
"C:\Window s\SysWOW64 \chkntfs.e xe" MD5: A9B42ED1B14BB22EF07CCC8228697408) - JogKDBeJAc.exe (PID: 4444 cmdline:
"C:\Progra m Files (x 86)\LpktEE EOouwnfKcO SvSCazLlTT qvDTCpPnea XBBgVQwbzB ChAtHAvXhB TVIiYnTAfJ pNSWGFzmOx \JogKDBeJA c.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717) - firefox.exe (PID: 2300 cmdline:
"C:\Progra m Files\Mo zilla Fire fox\Firefo x.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Formbook, Formbo | FormBook contains a unique crypter RunPE that has unique behavioral patterns subject to detection. It was initially called "Babushka Crypter" by Insidemalware. |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
JoeSecurity_FormBook_1 | Yara detected FormBook | Joe Security | ||
Click to see the 3 entries |
System Summary |
---|
Source: | Author: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: |
Source: | Author: frack113: |
Source: | Author: Michael Haag: |
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Initial file: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary |
---|
Source: | Large array initialization: |
Source: | COM Object queried: | Jump to behavior | ||
Source: | COM Object queried: | Jump to behavior | ||
Source: | COM Object queried: | Jump to behavior | ||
Source: | COM Object queried: | Jump to behavior |
Source: | Initial sample: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Anti Malware Scan Interface: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window found: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | File created: | Jump to dropped file |
Source: | Memory allocated: | Jump to behavior |
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQueryAttributesFile: | Jump to behavior | ||
Source: | NtQueryVolumeInformationFile: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtOpenSection: | Jump to behavior | ||
Source: | NtDeviceIoControlFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationToken: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtTerminateThread: | Jump to behavior | ||
Source: | NtOpenKeyEx: | Jump to behavior | ||
Source: | NtSetInformationProcess: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior | ||
Source: | NtNotifyChangeKey: | Jump to behavior | ||
Source: | NtCreateMutant: | Jump to behavior | ||
Source: | NtResumeThread: | Jump to behavior | ||
Source: | NtMapViewOfSection: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtReadFile: | Jump to behavior | ||
Source: | NtDelayExecution: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtResumeThread: | Jump to behavior | ||
Source: | NtCreateUserProcess: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtWriteVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtReadVirtualMemory: | Jump to behavior | ||
Source: | NtCreateKey: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Thread register set: | Jump to behavior |
Source: | Thread APC queued: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | 221 Scripting | Valid Accounts | 1 Windows Management Instrumentation | 221 Scripting | 612 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 211 Security Software Discovery | Remote Services | 1 Email Collection | 4 Ingress Tool Transfer | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Exploitation for Client Execution | 1 DLL Side-Loading | 1 Abuse Elevation Control Mechanism | 1 Disable or Modify Tools | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | 1 Data from Local System | 5 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 41 Virtualization/Sandbox Evasion | Security Account Manager | 41 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 5 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 612 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Abuse Elevation Control Mechanism | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | 123 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 Timestomp | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
26% | Virustotal | Browse | ||
21% | ReversingLabs | Script.Trojan.Heuristic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Dropper.Gen | ||
100% | Joe Sandbox ML | |||
55% | ReversingLabs | ByteCode-MSIL.Backdoor.FormBook |
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
www.brickhills.site | 103.224.182.242 | true | false | unknown | |
pin-ballerz.net | 199.15.251.162 | true | false | unknown | |
www.northidahoscans.online | 208.91.197.27 | true | false | unknown | |
www.allstary.top | 199.193.6.134 | true | false | unknown | |
www.waytoocool.life | 52.60.87.163 | true | false | unknown | |
just-do-public-0526-cpdhe.jiexi-010.top | 18.166.177.211 | true | false | unknown | |
www.timai.shop | unknown | unknown | false | unknown | |
www.pin-ballerz.net | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
52.60.87.163 | www.waytoocool.life | United States | 16509 | AMAZON-02US | false | |
199.15.251.162 | pin-ballerz.net | United States | 29713 | ELIA-60US | false | |
103.224.182.242 | www.brickhills.site | Australia | 133618 | TRELLIAN-AS-APTrellianPtyLimitedAU | false | |
208.91.197.27 | www.northidahoscans.online | Virgin Islands (BRITISH) | 40034 | CONFLUENCE-NETWORK-INCVG | false | |
18.166.177.211 | just-do-public-0526-cpdhe.jiexi-010.top | United States | 16509 | AMAZON-02US | false | |
199.193.6.134 | www.allstary.top | United States | 22612 | NAMECHEAP-NETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1576423 |
Start date and time: | 2024-12-17 03:39:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 59s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 2 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PO1341489LTB GROUP.vbs |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winVBS@9/3@8/6 |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
21:41:15 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
52.60.87.163 | Get hash | malicious | FormBook, PureLog Stealer | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
103.224.182.242 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
www.allstary.top | Get hash | malicious | FormBook | Browse |
| |
www.brickhills.site | Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | ScreenConnect Tool | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TRELLIAN-AS-APTrellianPtyLimitedAU | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
ELIA-60US | Get hash | malicious | Mirai | Browse |
| |
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\AppData\Local\Temp\x.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 226 |
Entropy (8bit): | 5.360398796477698 |
Encrypted: | false |
SSDEEP: | 6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv |
MD5: | 3A8957C6382192B71471BD14359D0B12 |
SHA1: | 71B96C965B65A051E7E7D10F61BEBD8CCBB88587 |
SHA-256: | 282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D |
SHA-512: | 76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\chkntfs.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196608 |
Entropy (8bit): | 1.121297215059106 |
Encrypted: | false |
SSDEEP: | 384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow |
MD5: | D87270D0039ED3A5A72E7082EA71E305 |
SHA1: | 0FBACFA8029B11A5379703ABE7B392C4E46F0BD2 |
SHA-256: | F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA |
SHA-512: | 18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\System32\wscript.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 335360 |
Entropy (8bit): | 7.903407989667696 |
Encrypted: | false |
SSDEEP: | 6144:olxP3BuIQQMqMLZFGLrtFaVkZKwQabJ4klsdy9Urg/rlAji5eyh2ptWlT6trxkD/:obP33yqMdFGLxFRUwz7Gy9oCrz5xMtW5 |
MD5: | D9A430A4C9B06A9C5F69147498335567 |
SHA1: | F91B0388A404A217B4ACC5A164133EC5F4005A6F |
SHA-256: | 0078E04B8BE75F019E8137D0276567A7C47B14224E0F7AAD2B3585BB4C8BAE45 |
SHA-512: | A3A68669137192EA91DF582049516887C95CD0BD77A6BA500C74DDE23ADDB3C8618901BD91AA3C6A12869151342E10139DD3E9AC8B5CE07D637E50D7088A9E24 |
Malicious: | true |
Antivirus: |
|
Preview: |
File type: | |
Entropy (8bit): | 5.987122412782155 |
TrID: |
|
File name: | PO1341489LTB GROUP.vbs |
File size: | 465'760 bytes |
MD5: | fe2b1e9947e1f7ab65d6542ba1abccc0 |
SHA1: | 2753756f5438d94c49fad80ba14bb5440a4b260a |
SHA256: | d618b1d56fbd24ce3c15bfd5c238f9ad8695156667d4b6e04c378f8eca6e34d7 |
SHA512: | 0390d5adeaa53471abea236fe16dfd2ea1f35f98028899b80bc42e338d55156a80d56b0c347727778874a8a7496e18e943f36b1aea3585bb6a2569e774fc9283 |
SSDEEP: | 6144:+4RU/er9SEoegy/BCHgjsFXQxe/AbfFi/UcVSSMbv+cO2GGCsuqxbw:+OcmpCHgjsF87DFi/BMfGdqx8 |
TLSH: | 2BA4E021C515A23FCEAA8F9E72040FE2B8F4047EDE89D646F40F586A5EF46354476F28 |
File Content Preview: | ' Define constants for XML and Base64 processing..Const XML_TYPE = "MSXML2.DOMDocument"..Const ELEMENT_TYPE = "text"..Const DATA_TYPE = "bin.base64"....' Declare variables..Dim base64EncodedString, tempFolderPath, executablePath....' Initialize the Base64 |
Icon Hash: | 68d69b8f86ab9a86 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 17, 2024 03:40:53.211585045 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:53.332360029 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:53.332457066 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:53.342633963 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:53.462415934 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:55.006685972 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:55.006721973 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:55.006757975 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:55.006880045 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:40:55.006903887 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:55.006993055 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:55.011595011 CET | 49764 | 80 | 192.168.2.5 | 208.91.197.27 |
Dec 17, 2024 03:40:55.131388903 CET | 80 | 49764 | 208.91.197.27 | 192.168.2.5 |
Dec 17, 2024 03:41:10.577919006 CET | 49805 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:10.697860003 CET | 80 | 49805 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:10.700676918 CET | 49805 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:10.722001076 CET | 49805 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:10.842021942 CET | 80 | 49805 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:11.932759047 CET | 80 | 49805 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:11.932800055 CET | 80 | 49805 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:11.932925940 CET | 49805 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:12.237056017 CET | 49805 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:13.255319118 CET | 49812 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:13.375114918 CET | 80 | 49812 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:13.375207901 CET | 49812 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:13.387609005 CET | 49812 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:13.507371902 CET | 80 | 49812 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:14.610407114 CET | 80 | 49812 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:14.610488892 CET | 80 | 49812 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:14.610542059 CET | 49812 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:14.913630009 CET | 49812 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:15.927184105 CET | 49818 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:16.046937943 CET | 80 | 49818 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:16.047044039 CET | 49818 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:16.060264111 CET | 49818 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:16.180124998 CET | 80 | 49818 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:16.180212021 CET | 80 | 49818 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:17.322793961 CET | 80 | 49818 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:17.322853088 CET | 80 | 49818 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:17.322910070 CET | 49818 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:17.593647957 CET | 49818 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:18.599076986 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:18.718866110 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:18.719033957 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:18.727762938 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:18.848069906 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:19.988640070 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:19.988773108 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:19.988806009 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:19.988922119 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:19.988961935 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:19.993052959 CET | 49825 | 80 | 192.168.2.5 | 103.224.182.242 |
Dec 17, 2024 03:41:20.113534927 CET | 80 | 49825 | 103.224.182.242 | 192.168.2.5 |
Dec 17, 2024 03:41:25.550228119 CET | 49844 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:25.669965029 CET | 80 | 49844 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:25.670066118 CET | 49844 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:25.685750008 CET | 49844 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:25.805506945 CET | 80 | 49844 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:26.808120012 CET | 80 | 49844 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:26.808142900 CET | 80 | 49844 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:26.808197021 CET | 49844 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:27.190165997 CET | 49844 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:28.209031105 CET | 49851 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:28.328713894 CET | 80 | 49851 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:28.328814030 CET | 49851 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:28.342521906 CET | 49851 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:28.462348938 CET | 80 | 49851 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:29.469501019 CET | 80 | 49851 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:29.469604969 CET | 80 | 49851 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:29.469660044 CET | 49851 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:29.846389055 CET | 49851 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:30.864737034 CET | 49857 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:30.984512091 CET | 80 | 49857 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:30.984703064 CET | 49857 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:30.996507883 CET | 49857 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:31.116492033 CET | 80 | 49857 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:31.116513968 CET | 80 | 49857 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:32.091340065 CET | 80 | 49857 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:32.091435909 CET | 80 | 49857 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:32.091483116 CET | 49857 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:32.502588034 CET | 49857 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:33.525619984 CET | 49863 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:33.645828962 CET | 80 | 49863 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:33.645911932 CET | 49863 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:33.653446913 CET | 49863 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:33.773322105 CET | 80 | 49863 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:34.752705097 CET | 80 | 49863 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:34.752918005 CET | 80 | 49863 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:34.752994061 CET | 49863 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:34.785953999 CET | 49863 | 80 | 192.168.2.5 | 199.15.251.162 |
Dec 17, 2024 03:41:34.905848980 CET | 80 | 49863 | 199.15.251.162 | 192.168.2.5 |
Dec 17, 2024 03:41:40.873377085 CET | 49879 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:40.993096113 CET | 80 | 49879 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:40.993222952 CET | 49879 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:41.013180017 CET | 49879 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:41.133339882 CET | 80 | 49879 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:42.257824898 CET | 80 | 49879 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:42.257883072 CET | 80 | 49879 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:42.257942915 CET | 49879 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:42.518311977 CET | 49879 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:43.537504911 CET | 49886 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:43.657366037 CET | 80 | 49886 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:43.657461882 CET | 49886 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:43.677175999 CET | 49886 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:43.796998978 CET | 80 | 49886 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:44.910455942 CET | 80 | 49886 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:44.910624027 CET | 80 | 49886 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:44.910770893 CET | 49886 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:45.190260887 CET | 49886 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:46.209836006 CET | 49892 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:46.329674959 CET | 80 | 49892 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:46.329793930 CET | 49892 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:46.353830099 CET | 49892 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:46.473623991 CET | 80 | 49892 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:46.473701954 CET | 80 | 49892 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:47.563179016 CET | 80 | 49892 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:47.563297033 CET | 80 | 49892 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:47.563371897 CET | 49892 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:47.862080097 CET | 49892 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:48.882781029 CET | 49902 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:49.002458096 CET | 80 | 49902 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:49.002672911 CET | 49902 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:49.013583899 CET | 49902 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:49.133327961 CET | 80 | 49902 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:50.236946106 CET | 80 | 49902 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:50.237127066 CET | 80 | 49902 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:50.237181902 CET | 49902 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:50.369240999 CET | 49902 | 80 | 192.168.2.5 | 199.193.6.134 |
Dec 17, 2024 03:41:50.488944054 CET | 80 | 49902 | 199.193.6.134 | 192.168.2.5 |
Dec 17, 2024 03:41:55.974720001 CET | 49918 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:56.094428062 CET | 80 | 49918 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:56.094526052 CET | 49918 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:56.111262083 CET | 49918 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:56.231034994 CET | 80 | 49918 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:57.208544016 CET | 80 | 49918 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:57.208688974 CET | 80 | 49918 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:57.208810091 CET | 49918 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:57.627763987 CET | 49918 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:58.645817995 CET | 49924 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:58.786267996 CET | 80 | 49924 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:58.786343098 CET | 49924 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:58.800487041 CET | 49924 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:41:59.029165983 CET | 80 | 49924 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:59.898473978 CET | 80 | 49924 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:59.898495913 CET | 80 | 49924 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:41:59.898607969 CET | 49924 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:00.315186977 CET | 49924 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:01.333448887 CET | 49931 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:01.453350067 CET | 80 | 49931 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:01.454343081 CET | 49931 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:01.467783928 CET | 49931 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:01.587675095 CET | 80 | 49931 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:01.587691069 CET | 80 | 49931 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:02.625368118 CET | 80 | 49931 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:02.649990082 CET | 80 | 49931 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:02.650058985 CET | 49931 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:02.971452951 CET | 49931 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:03.995183945 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:04.115307093 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:04.115447044 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:04.124947071 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:04.244852066 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.227713108 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.227760077 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.227838993 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.227982044 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.227991104 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228013992 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.228040934 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.228246927 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228256941 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228266001 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228317022 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.228317022 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.228593111 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228606939 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.228681087 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.347732067 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.347811937 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.351277113 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.351900101 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.393213987 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.419807911 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.419891119 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.422633886 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.424006939 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.427952051 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:05.428091049 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.431216955 CET | 49941 | 80 | 192.168.2.5 | 52.60.87.163 |
Dec 17, 2024 03:42:05.551088095 CET | 80 | 49941 | 52.60.87.163 | 192.168.2.5 |
Dec 17, 2024 03:42:11.643682957 CET | 49957 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:11.763451099 CET | 80 | 49957 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:11.763979912 CET | 49957 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:11.776240110 CET | 49957 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:11.895895004 CET | 80 | 49957 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:13.288774967 CET | 49957 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:13.409030914 CET | 80 | 49957 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:13.409183979 CET | 49957 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:14.302330971 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:14.422105074 CET | 80 | 49963 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:14.422278881 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:14.435077906 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:14.554909945 CET | 80 | 49963 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:15.940125942 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:16.014107943 CET | 80 | 49963 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:16.014471054 CET | 80 | 49963 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:16.016839027 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:16.016839027 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:16.060374975 CET | 80 | 49963 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:16.063134909 CET | 49963 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:17.317512989 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:17.437339067 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:17.438874006 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:17.451250076 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:17.571239948 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:17.571301937 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:18.955713034 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:19.036968946 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:19.037044048 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:19.037055969 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:19.037134886 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:19.075397968 CET | 80 | 49974 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:19.075459957 CET | 49974 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:19.974136114 CET | 49980 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:20.093977928 CET | 80 | 49980 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:20.094973087 CET | 49980 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:20.107106924 CET | 49980 | 80 | 192.168.2.5 | 18.166.177.211 |
Dec 17, 2024 03:42:20.226814032 CET | 80 | 49980 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:21.676249027 CET | 80 | 49980 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:21.676273108 CET | 80 | 49980 | 18.166.177.211 | 192.168.2.5 |
Dec 17, 2024 03:42:21.676400900 CET | 49980 | 80 | 192.168.2.5 | 18.166.177.211 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 17, 2024 03:40:52.753487110 CET | 52391 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:40:53.204112053 CET | 53 | 52391 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:41:10.052181959 CET | 63990 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:41:10.574491978 CET | 53 | 63990 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:41:25.005884886 CET | 58020 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:41:25.547740936 CET | 53 | 58020 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:41:39.802359104 CET | 51463 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:41:40.799827099 CET | 51463 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:41:40.871130943 CET | 53 | 51463 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:41:41.025144100 CET | 53 | 51463 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:41:55.382311106 CET | 63398 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:41:55.969944000 CET | 53 | 63398 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:42:10.444118023 CET | 63004 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:42:11.459353924 CET | 63004 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 17, 2024 03:42:11.641071081 CET | 53 | 63004 | 1.1.1.1 | 192.168.2.5 |
Dec 17, 2024 03:42:11.684582949 CET | 53 | 63004 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 17, 2024 03:40:52.753487110 CET | 192.168.2.5 | 1.1.1.1 | 0x90c1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:41:10.052181959 CET | 192.168.2.5 | 1.1.1.1 | 0x69a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:41:25.005884886 CET | 192.168.2.5 | 1.1.1.1 | 0xa80d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:41:39.802359104 CET | 192.168.2.5 | 1.1.1.1 | 0x4d33 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:41:40.799827099 CET | 192.168.2.5 | 1.1.1.1 | 0x4d33 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:41:55.382311106 CET | 192.168.2.5 | 1.1.1.1 | 0xd2d2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:42:10.444118023 CET | 192.168.2.5 | 1.1.1.1 | 0xf526 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 17, 2024 03:42:11.459353924 CET | 192.168.2.5 | 1.1.1.1 | 0xf526 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 17, 2024 03:40:53.204112053 CET | 1.1.1.1 | 192.168.2.5 | 0x90c1 | No error (0) | 208.91.197.27 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:10.574491978 CET | 1.1.1.1 | 192.168.2.5 | 0x69a8 | No error (0) | 103.224.182.242 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:25.547740936 CET | 1.1.1.1 | 192.168.2.5 | 0xa80d | No error (0) | pin-ballerz.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:25.547740936 CET | 1.1.1.1 | 192.168.2.5 | 0xa80d | No error (0) | 199.15.251.162 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:40.871130943 CET | 1.1.1.1 | 192.168.2.5 | 0x4d33 | No error (0) | 199.193.6.134 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:41.025144100 CET | 1.1.1.1 | 192.168.2.5 | 0x4d33 | No error (0) | 199.193.6.134 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:41:55.969944000 CET | 1.1.1.1 | 192.168.2.5 | 0xd2d2 | No error (0) | 52.60.87.163 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:42:11.641071081 CET | 1.1.1.1 | 192.168.2.5 | 0xf526 | No error (0) | just-do-public-0526-cpdhe.jiexi-010.top | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 17, 2024 03:42:11.641071081 CET | 1.1.1.1 | 192.168.2.5 | 0xf526 | No error (0) | 18.166.177.211 | A (IP address) | IN (0x0001) | false | ||
Dec 17, 2024 03:42:11.684582949 CET | 1.1.1.1 | 192.168.2.5 | 0xf526 | No error (0) | just-do-public-0526-cpdhe.jiexi-010.top | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 17, 2024 03:42:11.684582949 CET | 1.1.1.1 | 192.168.2.5 | 0xf526 | No error (0) | 18.166.177.211 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49764 | 208.91.197.27 | 80 | 4444 | C:\Program Files (x86)\LpktEEEOouwnfKcOSvSCazLlTTqvDTCpPneaXBBgVQwbzBChAtHAvXhBTVIiYnTAfJpNSWGFzmOx\JogKDBeJAc.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 03:40:53.342633963 CET | 395 | OUT | |
Dec 17, 2024 03:40:55.006685972 CET | 1236 | IN | |
Dec 17, 2024 03:40:55.006721973 CET | 1236 | IN | |
Dec 17, 2024 03:40:55.006757975 CET | 1174 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49805 | 103.224.182.242 | 80 | 4444 | C:\Program Files (x86)\LpktEEEOouwnfKcOSvSCazLlTTqvDTCpPneaXBBgVQwbzBChAtHAvXhBTVIiYnTAfJpNSWGFzmOx\JogKDBeJAc.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 03:41:10.722001076 CET | 649 | OUT | |
Dec 17, 2024 03:41:11.932759047 CET | 874 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49812 | 103.224.182.242 | 80 | 4444 | C:\Program Files (x86)\LpktEEEOouwnfKcOSvSCazLlTTqvDTCpPneaXBBgVQwbzBChAtHAvXhBTVIiYnTAfJpNSWGFzmOx\JogKDBeJAc.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 03:41:13.387609005 CET | 669 | OUT | |
Dec 17, 2024 03:41:14.610407114 CET | 874 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49818 | 103.224.182.242 | 80 | 4444 | C:\Program Files (x86)\LpktEEEOouwnfKcOSvSCazLlTTqvDTCpPneaXBBgVQwbzBChAtHAvXhBTVIiYnTAfJpNSWGFzmOx\JogKDBeJAc.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 17, 2024 03:41:16.060264111 CET | 1686 | OUT |