Windows
Analysis Report
BigProject.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- BigProject.exe (PID: 6008 cmdline:
"C:\Users\ user\Deskt op\BigProj ect.exe" MD5: 98ACEFB3B4D697642895F954C5256A49) - Acrobat.exe (PID: 5520 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\Acrobat .exe" "C:\ Users\user \AppData\L ocal\Temp\ NavanItine rary.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C) - AcroCEF.exe (PID: 6300 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ba ckgroundco lor=167772 15 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - AcroCEF.exe (PID: 3292 cmdline:
"C:\Progra m Files\Ad obe\Acroba t DC\Acrob at\acrocef _1\AcroCEF .exe" --ty pe=utility --utility -sub-type= network.mo jom.Networ kService - -lang=en-U S --servic e-sandbox- type=none --log-seve rity=disab le --user- agent-prod uct="Reade rServices/ 23.6.20320 Chrome/10 5.0.0.0" - -lang=en-U S --user-d ata-dir="C :\Users\us er\AppData \Local\CEF \User Data " --log-fi le="C:\Pro gram Files \Adobe\Acr obat DC\Ac robat\acro cef_1\debu g.log" --m ojo-platfo rm-channel -handle=21 08 --field -trial-han dle=1508,i ,103466520 7343497868 3,75643694 8276231946 5,131072 - -disable-f eatures=Ba ckForwardC ache,Calcu lateNative WinOcclusi on,WinUseB rowserSpel lChecker / prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE) - CasPol.exe (PID: 7404 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Cas Pol.exe" MD5: 914F728C04D3EDDD5FBA59420E74E56B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["rapeflowwj.lat", "sustainskelet.lat", "grannyejh.lat", "aspecteirs.lat", "discokeyus.lat", "crosshuaht.lat", "energyaffai.lat", "necklacebudi.lat", "stem-mellows.cyou"], "Build id": "OPCN2M--Sergei"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:21.986852+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:24.747780+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:27.065928+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49731 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:29.394631+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49741 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:31.548202+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49750 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:33.876391+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:36.710322+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49762 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:40.621968+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:23.478133+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:25.519678+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:41.374342+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:23.478133+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:25.519678+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:21.986852+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:24.747780+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:27.065928+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49731 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:29.394631+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49741 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:31.548202+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49750 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:33.876391+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:36.710322+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49762 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:40.621968+0100 | 2058361 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:20.422776+0100 | 2058360 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 64951 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:19.960727+0100 | 2058364 | 1 | Domain Observed Used for C2 Detected | 192.168.2.5 | 58190 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:34.549518+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 7_2_00415799 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 7_2_00423860 | |
Source: | Code function: | 7_2_0042DA53 | |
Source: | Code function: | 7_2_0043ECA0 | |
Source: | Code function: | 7_2_00409580 | |
Source: | Code function: | 7_2_00409580 | |
Source: | Code function: | 7_2_0043C767 | |
Source: | Code function: | 7_2_0040B70C | |
Source: | Code function: | 7_2_00415799 | |
Source: | Code function: | 7_2_00415799 | |
Source: | Code function: | 7_2_0042984F | |
Source: | Code function: | 7_2_00438810 | |
Source: | Code function: | 7_2_00438810 | |
Source: | Code function: | 7_2_00438810 | |
Source: | Code function: | 7_2_00438810 | |
Source: | Code function: | 7_2_0041682D | |
Source: | Code function: | 7_2_0041682D | |
Source: | Code function: | 7_2_0041682D | |
Source: | Code function: | 7_2_0041D83A | |
Source: | Code function: | 7_2_00423086 | |
Source: | Code function: | 7_2_00423086 | |
Source: | Code function: | 7_2_0042B170 | |
Source: | Code function: | 7_2_004179C1 | |
Source: | Code function: | 7_2_0043B1D0 | |
Source: | Code function: | 7_2_0043B1D0 | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_00405990 | |
Source: | Code function: | 7_2_00405990 | |
Source: | Code function: | 7_2_00422190 | |
Source: | Code function: | 7_2_00422190 | |
Source: | Code function: | 7_2_00422190 | |
Source: | Code function: | 7_2_0042CA49 | |
Source: | Code function: | 7_2_00416263 | |
Source: | Code function: | 7_2_00415220 | |
Source: | Code function: | 7_2_00427AD3 | |
Source: | Code function: | 7_2_0042CAD0 | |
Source: | Code function: | 7_2_0041B2E0 | |
Source: | Code function: | 7_2_0043CA93 | |
Source: | Code function: | 7_2_0041CB40 | |
Source: | Code function: | 7_2_0041CB40 | |
Source: | Code function: | 7_2_00428B61 | |
Source: | Code function: | 7_2_0042CB11 | |
Source: | Code function: | 7_2_0042CB22 | |
Source: | Code function: | 7_2_0043F330 | |
Source: | Code function: | 7_2_0040DBD9 | |
Source: | Code function: | 7_2_0040DBD9 | |
Source: | Code function: | 7_2_00417380 | |
Source: | Code function: | 7_2_0041D380 | |
Source: | Code function: | 7_2_00426B95 | |
Source: | Code function: | 7_2_00435450 | |
Source: | Code function: | 7_2_00417380 | |
Source: | Code function: | 7_2_00429C2B | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_004074F0 | |
Source: | Code function: | 7_2_004074F0 | |
Source: | Code function: | 7_2_004385E0 | |
Source: | Code function: | 7_2_004385E0 | |
Source: | Code function: | 7_2_00417DEE | |
Source: | Code function: | 7_2_00418591 | |
Source: | Code function: | 7_2_00428D93 | |
Source: | Code function: | 7_2_0041759F | |
Source: | Code function: | 7_2_0041C653 | |
Source: | Code function: | 7_2_00425E70 | |
Source: | Code function: | 7_2_00425E30 | |
Source: | Code function: | 7_2_0043AEC0 | |
Source: | Code function: | 7_2_00408F50 | |
Source: | Code function: | 7_2_00408F50 | |
Source: | Code function: | 7_2_0042A700 | |
Source: | Code function: | 7_2_0041BF14 | |
Source: | Code function: | 7_2_00419F30 | |
Source: | Code function: | 7_2_0041E7C0 | |
Source: | Code function: | 7_2_004197C2 | |
Source: | Code function: | 7_2_004197C2 | |
Source: | Code function: | 7_2_004197C2 | |
Source: | Code function: | 7_2_0042DFE9 | |
Source: | Code function: | 7_2_0040BFFD | |
Source: | Code function: | 7_2_0043EFB0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 7_2_004329C0 |
Source: | Code function: | 7_2_004329C0 |
Source: | Code function: | 0_2_00CA4EB1 | |
Source: | Code function: | 7_2_00408850 | |
Source: | Code function: | 7_2_00423860 | |
Source: | Code function: | 7_2_004218A0 | |
Source: | Code function: | 7_2_0042DA53 | |
Source: | Code function: | 7_2_0043ECA0 | |
Source: | Code function: | 7_2_00437DF0 | |
Source: | Code function: | 7_2_00409580 | |
Source: | Code function: | 7_2_004266D0 | |
Source: | Code function: | 7_2_0043F720 | |
Source: | Code function: | 7_2_00415799 | |
Source: | Code function: | 7_2_00438810 | |
Source: | Code function: | 7_2_0041682D | |
Source: | Code function: | 7_2_004288CB | |
Source: | Code function: | 7_2_0043D880 | |
Source: | Code function: | 7_2_00430940 | |
Source: | Code function: | 7_2_00403970 | |
Source: | Code function: | 7_2_00420939 | |
Source: | Code function: | 7_2_004179C1 | |
Source: | Code function: | 7_2_004231C2 | |
Source: | Code function: | 7_2_004241C0 | |
Source: | Code function: | 7_2_0043B1D0 | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_0043D980 | |
Source: | Code function: | 7_2_00405990 | |
Source: | Code function: | 7_2_00422190 | |
Source: | Code function: | 7_2_0043D997 | |
Source: | Code function: | 7_2_0043D999 | |
Source: | Code function: | 7_2_004091B0 | |
Source: | Code function: | 7_2_0042CA49 | |
Source: | Code function: | 7_2_00416263 | |
Source: | Code function: | 7_2_0040EA10 | |
Source: | Code function: | 7_2_00415220 | |
Source: | Code function: | 7_2_0042CAD0 | |
Source: | Code function: | 7_2_004252DD | |
Source: | Code function: | 7_2_0041B2E0 | |
Source: | Code function: | 7_2_00406280 | |
Source: | Code function: | 7_2_0043DA80 | |
Source: | Code function: | 7_2_0041E290 | |
Source: | Code function: | 7_2_0041CB40 | |
Source: | Code function: | 7_2_0043D34D | |
Source: | Code function: | 7_2_00426B50 | |
Source: | Code function: | 7_2_0043DB60 | |
Source: | Code function: | 7_2_00436B08 | |
Source: | Code function: | 7_2_0042830D | |
Source: | Code function: | 7_2_0042CB11 | |
Source: | Code function: | 7_2_00404320 | |
Source: | Code function: | 7_2_0042CB22 | |
Source: | Code function: | 7_2_00425327 | |
Source: | Code function: | 7_2_00408330 | |
Source: | Code function: | 7_2_0043F330 | |
Source: | Code function: | 7_2_0042A33F | |
Source: | Code function: | 7_2_0040DBD9 | |
Source: | Code function: | 7_2_00424380 | |
Source: | Code function: | 7_2_0041FC75 | |
Source: | Code function: | 7_2_0041DC00 | |
Source: | Code function: | 7_2_00429C2B | |
Source: | Code function: | 7_2_004291DD | |
Source: | Code function: | 7_2_004074F0 | |
Source: | Code function: | 7_2_0040ACF0 | |
Source: | Code function: | 7_2_0041148F | |
Source: | Code function: | 7_2_0042AC90 | |
Source: | Code function: | 7_2_0040CD46 | |
Source: | Code function: | 7_2_00437500 | |
Source: | Code function: | 7_2_00422510 | |
Source: | Code function: | 7_2_00417DEE | |
Source: | Code function: | 7_2_0041759F | |
Source: | Code function: | 7_2_00425E70 | |
Source: | Code function: | 7_2_00436E74 | |
Source: | Code function: | 7_2_00427603 | |
Source: | Code function: | 7_2_00425E30 | |
Source: | Code function: | 7_2_004286C0 | |
Source: | Code function: | 7_2_0043AEC0 | |
Source: | Code function: | 7_2_004236E2 | |
Source: | Code function: | 7_2_00405EE0 | |
Source: | Code function: | 7_2_0041DE80 | |
Source: | Code function: | 7_2_00402F50 | |
Source: | Code function: | 7_2_00420F50 | |
Source: | Code function: | 7_2_00438F59 | |
Source: | Code function: | 7_2_00406710 | |
Source: | Code function: | 7_2_00423F20 | |
Source: | Code function: | 7_2_00419F30 | |
Source: | Code function: | 7_2_0041E7C0 | |
Source: | Code function: | 7_2_004197C2 | |
Source: | Code function: | 7_2_0042DFE9 | |
Source: | Code function: | 7_2_0040A780 | |
Source: | Code function: | 7_2_00411F90 | |
Source: | Code function: | 7_2_00418792 | |
Source: | Code function: | 7_2_0043EFB0 |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 7_2_00437DF0 |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00B45090 | |
Source: | Code function: | 0_2_00B460F3 | |
Source: | Code function: | 0_2_00B450DF | |
Source: | Code function: | 0_2_00B44834 | |
Source: | Code function: | 0_2_00CA587E | |
Source: | Code function: | 0_2_00B45848 | |
Source: | Code function: | 0_2_00B4598A | |
Source: | Code function: | 0_2_00B4699E | |
Source: | Code function: | 0_2_00B4590A | |
Source: | Code function: | 0_2_00B452BB | |
Source: | Code function: | 0_2_00B46235 | |
Source: | Code function: | 0_2_00B47249 | |
Source: | Code function: | 0_2_00B4738B | |
Source: | Code function: | 0_2_00B45DB3 | |
Source: | Code function: | 0_2_00B4359C | |
Source: | Code function: | 0_2_00B446F2 | |
Source: | Code function: | 0_2_00B43E47 | |
Source: | Code function: | 0_2_00B44F9D | |
Source: | Code function: | 0_2_00B43F89 | |
Source: | Code function: | 7_2_0043D812 | |
Source: | Code function: | 7_2_0044346C | |
Source: | Code function: | 7_2_004436B1 | |
Source: | Code function: | 7_2_0043AE3E | |
Source: | Code function: | 7_2_0044171F | |
Source: | Code function: | 7_2_004477AA |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_00C17458 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 7_2_0043C1F0 |
Source: | Code function: | 0_2_00CA53A4 |
Source: | Code function: | 0_2_00CA53A4 | |
Source: | Code function: | 0_2_00CA55FE |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00CA5294 |
Source: | Key value queried: | Jump to behavior |
Source: | Registry key created or modified: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Disable or Modify Tools | Security Account Manager | 121 Security Software Discovery | SMB/Windows Admin Shares | 2 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 311 Process Injection | NTDS | 11 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Deobfuscate/Decode Files or Information | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 3 Obfuscated Files or Information | Cached Domain Credentials | 11 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 24 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
15% | Virustotal | Browse | ||
16% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
raw.githubusercontent.com | 185.199.110.133 | true | false | high | |
discokeyus.lat | 172.67.197.170 | true | false | high | |
x1.i.lencr.org | unknown | unknown | false | high | |
grannyejh.lat | unknown | unknown | false | high | |
stem-mellows.cyou | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | unknown | |||
false | high | |||
false | unknown | |||
false | high | |||
false | high | |||
false | unknown | |||
false | unknown | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.199.110.133 | raw.githubusercontent.com | Netherlands | 54113 | FASTLYUS | false | |
172.67.197.170 | discokeyus.lat | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579291 |
Start date and time: | 2024-12-21 13:16:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 20s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | BigProject.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@18/46@7/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 23.218.208.137, 162.159.61.3, 172.64.41.3, 2.22.50.131, 2.22.50.144, 3.233.129.217, 52.6.155.20, 52.22.41.97, 3.219.243.226, 23.195.39.65, 184.30.20.134, 23.32.239.56, 2.19.198.27, 23.192.153.142, 13.107.246.63, 20.109.210.53, 92.122.16.236, 4.175.87.197
- Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, e4578.dscb.akamaiedge.net, acroipm2.adobe.com.edgesuite.net, ctldl.windowsupdate.com, a767.dspw65.akamai.net, p13n.adobe.io, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, ssl.adobe.com.edgekey.net, ocsp.digicert.com, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
07:17:18 | API Interceptor | |
07:17:28 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.199.110.133 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
172.67.197.170 | Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse | ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRAT | Browse | |||
Get hash | malicious | LummaC, Stealc | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Stealc | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
raw.githubusercontent.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRAT | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
discokeyus.lat | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, SystemBC, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
FASTLYUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Azorult | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.233495543197344 |
Encrypted: | false |
SSDEEP: | 6:BIH9+i+q2P92nKuAl9OmbnIFUt8wIH7+E2WZmw+wIH8VkwO92nKuAl9OmbjLJ:BIHci+v4HAahFUt8wIH7qW/+wIH8V5LC |
MD5: | A7E05C6A8EBEC5B37FC501D1C73D5B86 |
SHA1: | 290036F31B65CA5B4F0E785E8F22231FCE9E724E |
SHA-256: | 816BE9C382719A983AF5A51350673DD6251E9E01FFCD02898F24BA150EE3762D |
SHA-512: | AD63431FD38D6561A71F9CA890A116112D65B293829494537A943A523BB21E975EF87968FC1AA5C5708431C571FBAE1C7F4F35E85C6F3F8A6DC1532AA63BE0C3 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.233495543197344 |
Encrypted: | false |
SSDEEP: | 6:BIH9+i+q2P92nKuAl9OmbnIFUt8wIH7+E2WZmw+wIH8VkwO92nKuAl9OmbjLJ:BIHci+v4HAahFUt8wIH7qW/+wIH8V5LC |
MD5: | A7E05C6A8EBEC5B37FC501D1C73D5B86 |
SHA1: | 290036F31B65CA5B4F0E785E8F22231FCE9E724E |
SHA-256: | 816BE9C382719A983AF5A51350673DD6251E9E01FFCD02898F24BA150EE3762D |
SHA-512: | AD63431FD38D6561A71F9CA890A116112D65B293829494537A943A523BB21E975EF87968FC1AA5C5708431C571FBAE1C7F4F35E85C6F3F8A6DC1532AA63BE0C3 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 335 |
Entropy (8bit): | 5.180157907612413 |
Encrypted: | false |
SSDEEP: | 6:BIS38+q2P92nKuAl9Ombzo2jMGIFUt8wISI2dXZmw+wIS5Q3VkwO92nKuAl9OmbX:BIwv4HAa8uFUt8wI2/+wIY85LHAa8RJ |
MD5: | 12D346B4ECE4395214F39C5F0864ACC6 |
SHA1: | E1D5A599A80D525A37DCBD87F7C0DEE9A658D61A |
SHA-256: | 7E14E51FB5D2A4338846C5B58C7AFA9B485D3439C862E63018153ED8EE250B98 |
SHA-512: | 4F2FEE3FF13D1CFE4D4D3FD466681595624F5C568A77D6A79ECB9A621768EA7F4F3A676E7AD94C26836988BD1BAEFF1F5B5A7C3A9C031BEF8551ABAA906A9D02 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 335 |
Entropy (8bit): | 5.180157907612413 |
Encrypted: | false |
SSDEEP: | 6:BIS38+q2P92nKuAl9Ombzo2jMGIFUt8wISI2dXZmw+wIS5Q3VkwO92nKuAl9OmbX:BIwv4HAa8uFUt8wI2/+wIY85LHAa8RJ |
MD5: | 12D346B4ECE4395214F39C5F0864ACC6 |
SHA1: | E1D5A599A80D525A37DCBD87F7C0DEE9A658D61A |
SHA-256: | 7E14E51FB5D2A4338846C5B58C7AFA9B485D3439C862E63018153ED8EE250B98 |
SHA-512: | 4F2FEE3FF13D1CFE4D4D3FD466681595624F5C568A77D6A79ECB9A621768EA7F4F3A676E7AD94C26836988BD1BAEFF1F5B5A7C3A9C031BEF8551ABAA906A9D02 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\3d1e02ca-7d74-4528-a57d-311e10c72d5b.tmp
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | modified |
Size (bytes): | 508 |
Entropy (8bit): | 5.044972188025652 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqgRSXhsBdOg2Hqcaq3QYiubxnP7E4TfF+:Y2sRdsr1dMHF3QYhbxP7np+ |
MD5: | 0BE2719A39194CC7F8CD680CC13D75CE |
SHA1: | 9D44A1228538173DF0961DA7F4A4C351715CC189 |
SHA-256: | C26C2666D05E030B4A472FA8E7FFB991E74B7D47974DE9964626AE7E56839AC0 |
SHA-512: | 8C0F7A8C112FA6F83D1AB0EE332296A0F363F6704FDE977C156B0AA6FE82D710DB95349C7C65F620CEEB8CD0854F4CF17783547FA1396085BA7870602F0EF3A9 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 508 |
Entropy (8bit): | 5.047195090775108 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+ |
MD5: | 70321A46A77A3C2465E2F031754B3E06 |
SHA1: | 5E7E713285D36F12ACFC68A34D8A34FD33C96B34 |
SHA-256: | 344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248 |
SHA-512: | E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\Network Persistent State~RF3f0879.TMP (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 508 |
Entropy (8bit): | 5.047195090775108 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+ |
MD5: | 70321A46A77A3C2465E2F031754B3E06 |
SHA1: | 5E7E713285D36F12ACFC68A34D8A34FD33C96B34 |
SHA-256: | 344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248 |
SHA-512: | E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Network\cc0a8cc8-8a22-4222-80fc-8f4c3b556c85.tmp
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 508 |
Entropy (8bit): | 5.047195090775108 |
Encrypted: | false |
SSDEEP: | 12:YH/um3RA8sqnT/sBdOg2HXcaq3QYiubxnP7E4TfF+:Y2sRdsgTAdMHW3QYhbxP7np+ |
MD5: | 70321A46A77A3C2465E2F031754B3E06 |
SHA1: | 5E7E713285D36F12ACFC68A34D8A34FD33C96B34 |
SHA-256: | 344DA48DA0F9A5CC258E10D6C28086B7718CBE596CDC3D7A2A61C8F5FD781248 |
SHA-512: | E885342B270FE3D538F17F8F80B9ED061B30EE55624177BD81F5C65C033160D71559D60872BC0F99C0C93FAE29F9D09FD5042B68D83CD538154D1335BAC8205D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\000003.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4099 |
Entropy (8bit): | 5.2374197512415686 |
Encrypted: | false |
SSDEEP: | 96:QqBpCqGp3Al+NehBmkID2w6bNMhugoKTNY+No/KTNcygLPGLLU8sCdMe:rBpJGp3AoqBmki25ZEVoKTNY+NoCTNLZ |
MD5: | 80E5024CB278B83978FDCD3649D0E6EE |
SHA1: | 1C7734EF8732975DA64ED1DF68738D5B1CBB881D |
SHA-256: | 68284E878E0A0E8415E87AF2D3C18672006E713932F85F0EE3272645E51E4815 |
SHA-512: | 07F7787EB589A74622E722DD7A30BE084B9FB947DAF733C7EBCBF87A63CE2EE0A609CA9AD6EAB26FA7BA993318D929EC5A86727F91438D7654F6473032B465B6 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 323 |
Entropy (8bit): | 5.210360622585316 |
Encrypted: | false |
SSDEEP: | 6:BIS1P+q2P92nKuAl9OmbzNMxIFUt8wISzmZZmw+wISmtVkwO92nKuAl9OmbzNMFd:BIyWv4HAa8jFUt8wItZ/+wIN5LHAa84J |
MD5: | 2AA1CD59914C9B63ACBDC91AD04EDBD9 |
SHA1: | 3ACCB7EE0FA217F710E80E26E58F6049FFB632B9 |
SHA-256: | D1E16DC6730CA6BE753CEEDEEEB5FD4A8F322D818F8386406E2420C89EE9DE17 |
SHA-512: | 427FC01AF9FEE1453A96576ACA9C640492A17C88C394587B34AA44DCDCCAABC0C24AC05EC1E60799D18A646C2ED59099B0B6D25A82560C22DFB66C061A48F8E3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage\LOG.old (copy)
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 323 |
Entropy (8bit): | 5.210360622585316 |
Encrypted: | false |
SSDEEP: | 6:BIS1P+q2P92nKuAl9OmbzNMxIFUt8wISzmZZmw+wISmtVkwO92nKuAl9OmbzNMFd:BIyWv4HAa8jFUt8wItZ/+wIN5LHAa84J |
MD5: | 2AA1CD59914C9B63ACBDC91AD04EDBD9 |
SHA1: | 3ACCB7EE0FA217F710E80E26E58F6049FFB632B9 |
SHA-256: | D1E16DC6730CA6BE753CEEDEEEB5FD4A8F322D818F8386406E2420C89EE9DE17 |
SHA-512: | 427FC01AF9FEE1453A96576ACA9C640492A17C88C394587B34AA44DCDCCAABC0C24AC05EC1E60799D18A646C2ED59099B0B6D25A82560C22DFB66C061A48F8E3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1391 |
Entropy (8bit): | 7.705940075877404 |
Encrypted: | false |
SSDEEP: | 24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1 |
MD5: | 0CD2F9E0DA1773E9ED864DA5E370E74E |
SHA1: | CABD2A79A1076A31F21D253635CB039D4329A5E8 |
SHA-256: | 96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6 |
SHA-512: | 3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71954 |
Entropy (8bit): | 7.996617769952133 |
Encrypted: | true |
SSDEEP: | 1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ |
MD5: | 49AEBF8CBD62D92AC215B2923FB1B9F5 |
SHA1: | 1723BE06719828DDA65AD804298D0431F6AFF976 |
SHA-256: | B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F |
SHA-512: | BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2D85F72862B55C4EADD9E66E06947F3D
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 192 |
Entropy (8bit): | 2.779094196322516 |
Encrypted: | false |
SSDEEP: | 3:kkFkl2Yoml1fllXlE/HT8k8ZNNX8RolJuRdxLlGB9lQRYwpDdt:kKvYoml2T8xNMa8RdWBwRd |
MD5: | B082DD75C381758302A8D9FDCB2AE846 |
SHA1: | AC65BF020C2A8EB9332689A583BC2C4CECF9E1FE |
SHA-256: | 21C2E7D886399D6A4E239083D4AF6C14FAE5E0F1DB27CCCE4D5EFE6B4E66CEC8 |
SHA-512: | 8E45D392F61AA4E9333FFFEBCCFADD418760DE016C22031155C544924FFBB3EEFBFE5C7A3A851ABC0C55A1420D1BF134554769E41F086C30ECEBCE588E76BC89 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | modified |
Size (bytes): | 328 |
Entropy (8bit): | 3.1402905242023693 |
Encrypted: | false |
SSDEEP: | 6:kKqD9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:iaDnLNkPlE99SNxAhUe/3 |
MD5: | 624DC94A9BE7D2B795A155A093B1E688 |
SHA1: | 99209FCF39D8A7E56191AEB6F6E86FD20D1F7B0B |
SHA-256: | 357A8B393542CDCBD1D83E037AFDD86DE7CC2029302F07FD11469FBBBAA6F0E6 |
SHA-512: | CAEF4483F0BC077041807A2AFCB885303E98882B32EF763F3155177C2F6F242CC47215228C31CCD3075828F42BD9471ED66FEE1833D10BC9EA6C23829A0F7999 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\ACROBAT_READER_MASTER_SURFACEID
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 295 |
Entropy (8bit): | 5.334969082037231 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJM3g98kUwPeUkwRe9:YvXKX4mtjYpW78FGMbLUkee9 |
MD5: | 1DD38C7A726C2DDE9259F37EAD9F47C8 |
SHA1: | E337C27BC8725C373FFDF0E6B44A3DF19A4A9A05 |
SHA-256: | 318B5256607EC4291E39DAFCBDE904155ED08504937BA6C2D75A5EEBCFA67151 |
SHA-512: | 8538F27F39132C2E146D400257D8C47784AF0B1D3730DBFE9957F91499B710AF4D9F022894CAC166B0B22966D22BF7FCB20D733CCAC92865654E2E2A9594746C |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Home_View_Surface
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 294 |
Entropy (8bit): | 5.272540812643513 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfBoTfXpnrPeUkwRe9:YvXKX4mtjYpW78FGWTfXcUkee9 |
MD5: | EF3AA964B7287EF1BA92F39D3F0883DD |
SHA1: | 34C5305B96D27D1685FF53AFB7065A59359E32C5 |
SHA-256: | 9256B9A589F0C2821038BCFC1E42F77FDF3CFA6916DEA9F282E9F68A2D6BBEAE |
SHA-512: | 84E764456A74E3DF2B73840EC751EA62D6F89B2CBAE29C506FDB9C1A6FEAEA22B79613062E21D7656F9381D4522D1974F0098D4D6999C5A0ED2DCDDB03C3358F |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_FirstMile_Right_Sec_Surface
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 294 |
Entropy (8bit): | 5.2512470268703915 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfBD2G6UpnrPeUkwRe9:YvXKX4mtjYpW78FGR22cUkee9 |
MD5: | 5C518290C8095E21363222E4BE3439F8 |
SHA1: | CB0C5A01162CC2F0876694D52A0AFDF67E7B7BF5 |
SHA-256: | FD1C38C19E42C7280FC3761A74A5ABD54E3E32CEDED0EF69D172E27EB2C20C40 |
SHA-512: | 4CAA143AF1B4E1AE76E1D55E8E478A649C6053CC43420C2697283D8100A4D8B4F2033C00663257D96E1F7E95A3537AE03F2B4F7BBDBC0F1BB775503E9BFFBA3E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_READER_LAUNCH_CARD
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 285 |
Entropy (8bit): | 5.312865668312923 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfPmwrPeUkwRe9:YvXKX4mtjYpW78FGH56Ukee9 |
MD5: | 34F57072C02ED9FBEC99DE325F81E9B7 |
SHA1: | 93C997540F76EE50B255AC31E24B00EF2684E96C |
SHA-256: | 417DFDC2D05FD962908BA359D92A76C11F2E2E5C91EF1E71E4BF25103FFDABC5 |
SHA-512: | 3F67E09217D76BB73EEA9058BA4646EFFD4BD1241B90D8CE70E9C80E02985061A7A722530542C060434C1C11212B2735D31D5C61CD8DA8D94A72EC40B3007DD2 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Convert_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1123 |
Entropy (8bit): | 5.690582943125167 |
Encrypted: | false |
SSDEEP: | 24:Yv6X49i8KpLgE9cQx8LennAvzBvkn0RCmK8czOCCSP:Yva3hgy6SAFv5Ah8cv/P |
MD5: | 91F76867F8F8F0E10452D29999A2DE9E |
SHA1: | 4BC8D1861C544089CE46FAA0303BDF2719A0963F |
SHA-256: | 75BB65E3D910441894E41AC0EEA5AC89E199EC7250CC968D3F8261A2F46EFF6D |
SHA-512: | 437FD58D402EE477A3262442435BF8C94DBDCA8E648EAF5597492B04ED636587B6FD2D1055891B76D18BFE7A89D42D95200170C7EA2528379955DE8FE8B45986 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.259406844936233 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJf8dPeUkwRe9:YvXKX4mtjYpW78FGU8Ukee9 |
MD5: | 8EB8529C6F8CC5D2B940DCB99AC30889 |
SHA1: | B6A3DA65C65A0F062A031D0565E8B0C9154EA6D7 |
SHA-256: | F9F9CAA2E67CA004FB4D06E4C9F6F4B42CDF75EE42F588CA987564A43F7F51F2 |
SHA-512: | EF55837FF889128E278EA98277D0668A16115B0D4CFDD6A48C58EC5CA8D030AE3B30A1509BD61546E936F2B0F5EDAC944F404242006681193AE9514A49CD32A2 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Disc_LHP_Retention
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 292 |
Entropy (8bit): | 5.260779099331064 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfQ1rPeUkwRe9:YvXKX4mtjYpW78FGY16Ukee9 |
MD5: | A20E113418C243EB3A96649E551A3D1F |
SHA1: | BDC1198C005D31E1A5A85926DB243BACDF00A2D2 |
SHA-256: | A8A62020B818DE767D2C1BE558FD56B6BF36C5A0F55E8B8EDF7CC7E41B49BD65 |
SHA-512: | 7140824CB5793D5EA8F7930B487CC45ADE385942EC88548274B2FBF1CE5465F7A6DFE54FD539C7D4C7645EDFF421CE1AD8CB6CED843A850428C274AB875942BD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Edit_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.279423866337794 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfFldPeUkwRe9:YvXKX4mtjYpW78FGz8Ukee9 |
MD5: | A99EFB3AFA1D02F792175BC3B5ECA967 |
SHA1: | E905E5ED19D8525CB53CD7DC9B506ECB5DA70BBD |
SHA-256: | 1EA89026930CC815DF130A81B33EC28B7F4F16F810EA480C62366B9E68508893 |
SHA-512: | B0B1A83CFC54C0CC2B82D8308DCE94B6F8303873C17B252BCA2849D1B03C75EFAC18415F5DCB1130F7BBF1DBDB09237751DADB8A5339B7FA6C8340421F80F854 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Home_LHP_Trial_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 295 |
Entropy (8bit): | 5.287484719526209 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfzdPeUkwRe9:YvXKX4mtjYpW78FGb8Ukee9 |
MD5: | 531646240785E3071721036465EE1BFB |
SHA1: | 79C7C6B544ED67B1C35C5059B8815EB946AB6619 |
SHA-256: | 50F21A9742EC59C2512922A056A9EA5D0097A4097C529A75305B7414A82DE1D1 |
SHA-512: | 5EE1FBB4F2FC87EAEF6F276225A9B29F8C96BFA81166695DDDD2FEE9742E91192E9DDAAADA96D11E534AA574EB2B4CB584A5BB64EB029A6BAD21D1005E53E3A5 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_More_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 289 |
Entropy (8bit): | 5.267172798522027 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfYdPeUkwRe9:YvXKX4mtjYpW78FGg8Ukee9 |
MD5: | 0746E803DB11912CCDC5AE4188887FE7 |
SHA1: | 0E60CCF940D721F980113E915D3AEE3F74AC3B88 |
SHA-256: | 1EB34E173584B9A66FFB1AEF725C1B0F9809E5B9DA13C17B2D03C19A28361181 |
SHA-512: | 5E4E0322C5D6C7BE7BC35A7D590DEC5D7711C3FDB71200592D7CAD130E742638DEFD3736EB81F998F0DBB25D1929DFD96D61CEDBF66D4D2DC4587E322B35E776 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 284 |
Entropy (8bit): | 5.252645227656909 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJf+dPeUkwRe9:YvXKX4mtjYpW78FG28Ukee9 |
MD5: | B76929FC7AFD84F4ED4AD01221A596C3 |
SHA1: | E482BAF138DA542408EA41B269F42325D3B552D2 |
SHA-256: | 3F499569BB230BD1D27AF039CBBB10889C942E7E2F4889742D527E2815292795 |
SHA-512: | EBA245DFF27559D3E0F5BB8777131F0D39FE24BA529027684B8D8C400D947A3FA3FB88C140554402C5F663071424913AE3BA44CF66B4925F0B6C51C2D4AD331E |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Intent_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 291 |
Entropy (8bit): | 5.250945512700895 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfbPtdPeUkwRe9:YvXKX4mtjYpW78FGDV8Ukee9 |
MD5: | 001C821C5426F3F44CE4942C4A3C7F74 |
SHA1: | 9CA84C1BED247E7647052CF52D073AA43FE22C43 |
SHA-256: | 28D0ED629FAA82932A908727D0B163F0F8BDDB64F11DC60BF6524D9E5D0BEE50 |
SHA-512: | 017D726C238FC858B306A03C1EE59F6CE07003527257C74EBE15D24220CC73E2B4050F5737E44A555351B4FC620DAA14F0EB6B3F34E50F7EA314562B3D85A69D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_RHP_Retention
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 287 |
Entropy (8bit): | 5.251849973882246 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJf21rPeUkwRe9:YvXKX4mtjYpW78FG+16Ukee9 |
MD5: | 6A07879C8FBB95E79B2CFCF593589640 |
SHA1: | E399C5302E7745552297D193B00EA6EF6AD73554 |
SHA-256: | 09A3997B3A13142D47BAB5FA8A1F3F780A1827AE98356FAD929F7DB9D769BD2D |
SHA-512: | 0D2FDA81701D48D2C0CF5422C677A0A8E77B419F7BD0057D4AD7CCFAE0C7F7ACA09601CD225494AA573CC5E14496F44591540005058041ECDB9FDCADA0170CC0 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Sign_LHP_Banner
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1090 |
Entropy (8bit): | 5.6643901605840625 |
Encrypted: | false |
SSDEEP: | 24:Yv6X49i8WamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSP:YvanBgkDMUJUAh8cvMP |
MD5: | 9C98CF86BDE1AA5299909D468E577404 |
SHA1: | F8279C0DDEFA08107E06AC1F845FDAC6F2CDF6E6 |
SHA-256: | 4DDA1B58590A938B86B623B92D17C2196A5F5A56A1799787B2B192CAFD981E8A |
SHA-512: | E5B5EE4FD0548115984565B8A8AFFAEB3DC6E5481D39DCCB1847EA4345D920988B9A625C6A3C1026F7092EC6001F748ECDCA05CC083F6B6CB2514B06CBA2F08C |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\Files\DC_Reader_Upsell_Cards
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 286 |
Entropy (8bit): | 5.226367093219598 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJfshHHrPeUkwRe9:YvXKX4mtjYpW78FGUUUkee9 |
MD5: | D327F6489DB0BE0B07FF82C3F76058A9 |
SHA1: | 892B8F18D1582D218BF573F7928AA231BA01EAAA |
SHA-256: | 09359688C34D298C3DFC959193AD6DF236C7F166AECDC94C7BFD6780DAE633EC |
SHA-512: | F8777A9B0E385080EFD434E2466DAD690022B32D3970D02F8459272321D29FC33A058D054C91B6BC067FF41400D6DD90ED64A6AF3E0E6BF737C45B70DFC5E390 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 282 |
Entropy (8bit): | 5.2371390024047155 |
Encrypted: | false |
SSDEEP: | 6:YEQXJ2HX4lzPctO+FIbRI6XVW7+0Y+sFUoAvJTqgFCrPeUkwRe9:YvXKX4mtjYpW78FGTq16Ukee9 |
MD5: | 25D560A6090F98773734B78C0F96AF96 |
SHA1: | 419E356E06443F313B07478DDC40C1FFAE2B8D1A |
SHA-256: | 9AC95986DDA5FA5AD1F8D4560F45F3C9C852B1753254B25D940F7EFE04915FC6 |
SHA-512: | 6585DDC218727F0D294C7EA1CDA61F58171FB79CBAA540C7B4518203C4BCF39834D8F67A7C2B4A260D2A73CE7439FA597F8D039514B8202FB92C04CF6E68105E |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4 |
Entropy (8bit): | 0.8112781244591328 |
Encrypted: | false |
SSDEEP: | 3:e:e |
MD5: | DC84B0D741E5BEAE8070013ADDCC8C28 |
SHA1: | 802F4A6A20CBF157AAF6C4E07E4301578D5936A2 |
SHA-256: | 81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06 |
SHA-512: | 65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2814 |
Entropy (8bit): | 5.144006588516618 |
Encrypted: | false |
SSDEEP: | 48:YYnDUoS6vZAIQiFk3hPtpHP6nRhc4ub9E3:DDLS6B1Q8glpHohgpE3 |
MD5: | F1AEE56BD89B6F023DB7759C18302855 |
SHA1: | EA9C51B6066101B6DFEE7D6AC3DC8CA17FF3A78F |
SHA-256: | 11201E9EA593DBB865D2EDCAC03DA50AB7468B774A9FF5602E1E534D37F30485 |
SHA-512: | D78D2A244A7778D5F5851139843EC8A61C483426505B74B3EE515F6E0DE51FB2A7F729D46C5BC579DF1951E858889A3C0FE3EB33DEE6B660366AE0F97A972A6B |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 0.9861200293203947 |
Encrypted: | false |
SSDEEP: | 24:TLHRx/XYKQvGJF7urs6I1RZKHs/Ds/SpbeS4zJwtNBwtNbRZ6bRZ4YeSF:TVl2GL7ms6ggOVpbGzutYtp6PVH |
MD5: | 6D1FD8F483C18195F89DB96DA637E86B |
SHA1: | DA2BD84237F01F67F58C3D4D1876C9FA022A6111 |
SHA-256: | 7EABEB3E6907D6F5BA6609D135069FC1541275C9BF5F616B6BC76AB9F5DFE660 |
SHA-512: | FADF9BA7C266576B877FAF1927BDF02132ADDD82D0962B4510FC983C16C996AC1045E1FFAEAF91DD5B51ED0E304B553C96D050396622D49D0122046E6E407BDB |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8720 |
Entropy (8bit): | 1.3393651894411216 |
Encrypted: | false |
SSDEEP: | 24:7+tAmAD1RZKHs/Ds/SpbeSPzJwtNBwtNbRZ6bRZWf1RZKxqLBx/XYKQvGJF7ursD:7MAmGgOVpbdzutYtp6PM0qll2GL7msD |
MD5: | C1F4A544E531CA52D356849488E5D660 |
SHA1: | F620067E3F5DCC1DBA998C736F7CF22EAA95B628 |
SHA-256: | 69D07ADAD7F05CAE4A4498853EF57508E26AB64D36A0CB6419C06C654BF04100 |
SHA-512: | B1410B7D0BDD6E3DCABA8745369F4CD2350539F72B9D5A1B14EA40DA065FFCB84DA4841C5218A4243DE6FFAF1AC25DC8BDF51FD21B2A26A11C5ECA5D05F1D6AF |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66726 |
Entropy (8bit): | 5.392739213842091 |
Encrypted: | false |
SSDEEP: | 768:RNOpblrU6TBH44ADKZEgG+SP+d7aFqNsGW9drniN7tk8DEVoYyu:6a6TZ44ADEG+IQ7a4NvttkVSK |
MD5: | 1DE6CADC6ADA823628FF2998472E3F91 |
SHA1: | 61034627AB4AC9407EE3255DA12817CCF9105592 |
SHA-256: | 5A15C3BC21CE24D6545666143004DD9DDA3A916F2799320343D46219084AF495 |
SHA-512: | C39B716B5B4AC0739D17A8389B8BD9E7DF51F68EE44A574F6BC39C0DB19BC812E197DCEBC5D43EC0D4D6CB230E1F1FA39E337264587AC03CC3090B4E7AFD43AD |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\NavanItinerary[1].pdf
Download File
Process: | C:\Users\user\Desktop\BigProject.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51800 |
Entropy (8bit): | 7.644473294145779 |
Encrypted: | false |
SSDEEP: | 768:yaBT4Xd/H2AZAyXOKmd8iOK5ZezAr5MUXs6dcoboWopxasKk48WoGQICpVMRtJHi:0XaPEaAHjlO4Bsl52QAVZFKdtTvyh |
MD5: | 0AEE57F18680198E40AA2A6B37D2EB7E |
SHA1: | 222695CE34141FF67BC730F534A363A47CE9791D |
SHA-256: | EFEEBFD836442C3C6D011F68D0A8B48F0323AF49F60C53243341703122CC5A07 |
SHA-512: | DC7C1DB22E7F6A0AC2A1831C6652CFD8A96C9D5B64D50775822D20DA1193EF4134CECEFF23AED3AC5A6CE8C3E754B3FCF54313650807623A50E55A4E5DC76749 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 246 |
Entropy (8bit): | 3.4857408731223103 |
Encrypted: | false |
SSDEEP: | 6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8dkr7:Qw946cPbiOxDlbYnuRK/r7 |
MD5: | ACBD64C7878A9F83EB7DE86DFD164CF7 |
SHA1: | 1FC273C10E93F9B69B575B8DFB65D0E072B8DFC9 |
SHA-256: | 38931920E735255E2401F0B1B50696855FF86667E82800AC25DDC2FD0497C574 |
SHA-512: | 9A0F9258F2B0CFF667B14A3923D453E6A41561614A80727D3896CEA7EBDC2419EEFF76C1000B6DB045DF761351F5E792D35E8942DB40D35E98D885DAF8933C79 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\BigProject.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51800 |
Entropy (8bit): | 7.644473294145779 |
Encrypted: | false |
SSDEEP: | 768:yaBT4Xd/H2AZAyXOKmd8iOK5ZezAr5MUXs6dcoboWopxasKk48WoGQICpVMRtJHi:0XaPEaAHjlO4Bsl52QAVZFKdtTvyh |
MD5: | 0AEE57F18680198E40AA2A6B37D2EB7E |
SHA1: | 222695CE34141FF67BC730F534A363A47CE9791D |
SHA-256: | EFEEBFD836442C3C6D011F68D0A8B48F0323AF49F60C53243341703122CC5A07 |
SHA-512: | DC7C1DB22E7F6A0AC2A1831C6652CFD8A96C9D5B64D50775822D20DA1193EF4134CECEFF23AED3AC5A6CE8C3E754B3FCF54313650807623A50E55A4E5DC76749 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6 2024-12-21 07-17-18-381.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16525 |
Entropy (8bit): | 5.376360055978702 |
Encrypted: | false |
SSDEEP: | 384:6b1sdmfenwop+WP21h2RPjRNg7JjO2on6oU6CyuJw1oaNIIu9EMuJuF6MKK9g9JQ:vIn |
MD5: | 1336667A75083BF81E2632FABAA88B67 |
SHA1: | 46E40800B27D95DAED0DBB830E0D0BA85C031D40 |
SHA-256: | F81B7C83E0B979F04D3763B4F88CD05BC8FBB2F441EBFAB75826793B869F75D1 |
SHA-512: | D039D8650CF7B149799D42C7415CBF94D4A0A4BF389B615EF7D1B427BC51727D3441AA37D8C178E7E7E89D69C95666EB14C31B56CDFBD3937E4581A31A69081A |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Temp\acrobat_sbx\NGL\NGLClient_AcrobatReader123.6.20320.6.log
Download File
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 15113 |
Entropy (8bit): | 5.359048872344854 |
Encrypted: | false |
SSDEEP: | 384:npvcntufxWvJtyCgUg6gIgMRFGxo8HuLl8gq1yFZnbXmJ4e4ZHOvtMatlwlw9AKp:rUA |
MD5: | 76032492296B6ADF28EC746CCBC3BA40 |
SHA1: | 1D24EBCB9E2BCDC55FB5BE2EF142B61689ECDC3D |
SHA-256: | 0C7853ADB262A57C2B10ADBB080E6F3F67979B415682FDD350B326081AEDA010 |
SHA-512: | 164E23FA8CA568F6CFFF564B9D79AE9E2C80FA3549F595B34A6B418F537B85CF32AD453186D9D65BB0675365C4ACDEC4DF82919124DDCBADC887021B3C17598A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29752 |
Entropy (8bit): | 5.397942280579044 |
Encrypted: | false |
SSDEEP: | 768:GLxxlyVUFcAzWL8VWL1ANSFld5YjMWLvJ8Uy++NSXl3WLd5WLrbhhVClkVMwDGbf:T |
MD5: | D50E3C3784E360C7070399BB5B587297 |
SHA1: | 3D093E2660F85A6ADD3F6785119817B042F8B43A |
SHA-256: | 4AD504973D5507589DA0EC33F1CAA1FF0BEA2A5C4BC08EF56F9DF433130A49B0 |
SHA-512: | 15712E87E0BDC3DBCBD11CCF82E4D1C506AE6D8E3A0B0B0C6CC109CBCC646F61DC0B79EB6090FACB97E120D66E98F50BA9771287F39B2320FD090E2000DF2B1A |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1419751 |
Entropy (8bit): | 7.976496077007677 |
Encrypted: | false |
SSDEEP: | 24576:/VR9WL07oXGZnYIGNPJNdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:tR9WLxXGZnZGh3mlind9i4ufFXpAXkru |
MD5: | 9D85D4B75E446857CE3D750299B2AF1A |
SHA1: | 3CD9576D0A07B9E4454F4FF4DDF8D18EFBB764B4 |
SHA-256: | D3C44F50FD2912C92DAF009689B221515709E00C839A8DA425078C96F2D6053A |
SHA-512: | 1C63A091EF404FC446F1A789D33258FE9F6AD25C80375CADADF0829BC5DCD70A16A8E30E664D0A02F39E7A3D10B9E56AD7F9CA9D733A877726C1DD043B14842F |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 386528 |
Entropy (8bit): | 7.9736851559892425 |
Encrypted: | false |
SSDEEP: | 6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m |
MD5: | 5C48B0AD2FEF800949466AE872E1F1E2 |
SHA1: | 337D617AE142815EDDACB48484628C1F16692A2F |
SHA-256: | F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE |
SHA-512: | 44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324 |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1407294 |
Entropy (8bit): | 7.97605879016224 |
Encrypted: | false |
SSDEEP: | 24576:/IkwYIGNPQbdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07mWL07oXGZd:zwZG2b3mlind9i4ufFXpAXkrfUs0CWLk |
MD5: | 9431A1C2A3C1BEFE8F3925B1B333DC34 |
SHA1: | 4E77620153F74BE80B9D533FD16826A276113460 |
SHA-256: | 9C81A3C6CA676D3D45D2C43A2204E3B78DFB3C0082A1748B67CD9F95AD419ABC |
SHA-512: | 56AC05EAAAD17DBBA09E224C4472D1792C5B038ECB976E9DD107817999ACF7E8A217D0E6A61983777569426A7493661CF2CE16FF6753FE8517EFA360B52C871F |
Malicious: | false |
Preview: |
Process: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 758601 |
Entropy (8bit): | 7.98639316555857 |
Encrypted: | false |
SSDEEP: | 12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg |
MD5: | 3A49135134665364308390AC398006F1 |
SHA1: | 28EF4CE5690BF8A9E048AF7D30688120DAC6F126 |
SHA-256: | D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B |
SHA-512: | BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.163177919243492 |
TrID: |
|
File name: | BigProject.exe |
File size: | 1'600'512 bytes |
MD5: | 98acefb3b4d697642895f954c5256a49 |
SHA1: | 6db25168111275435e21e68773dc88d1cf86cfd9 |
SHA256: | 36ae8fda3c54b17e1a0609c07aab00a27c435244e19990d45327e21b16455718 |
SHA512: | 6fbc24ff91e727b10b9761a4d517f43c992d36e1d968b926304086f6d9176b918ab26833f6a8b834996e847b9bda9147e6b1c06544c1cb500c6fd3be155d5c30 |
SSDEEP: | 24576:D/nhP4bMsbpX48FjzODzbSPkRuWPcHYF+Xe61PVLpCeRseo4nEc+vi2ofHiNiOEP:D/nhP0xh48NzObik7A4pMiNe2dUZ |
TLSH: | 6D75B754F6AB5222E0533EF418BF23669261A830307ECE57F0446E5654C1336EB9FDAB |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......VS.Q.2...2...2...J`..2.......2.......2.......2.......2..b....2...2...2.......2.......2..Rich.2..........................PE..L.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x564c49 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67661A2B [Sat Dec 21 01:30:19 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 8f05acdfcf958ad49d502159c452d8a0 |
Instruction |
---|
call 00007F9BA46FFC28h |
jmp 00007F9BA46FF40Fh |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
push esi |
mov ecx, dword ptr [eax+3Ch] |
add ecx, eax |
movzx eax, word ptr [ecx+14h] |
lea edx, dword ptr [ecx+18h] |
add edx, eax |
movzx eax, word ptr [ecx+06h] |
imul esi, eax, 28h |
add esi, edx |
jmp 00007F9BA46FF5A7h |
mov ecx, dword ptr [edx+0Ch] |
cmp dword ptr [ebp+0Ch], ecx |
jc 00007F9BA46FF59Ch |
mov eax, dword ptr [edx+08h] |
add eax, ecx |
cmp dword ptr [ebp+0Ch], eax |
jc 00007F9BA46FF59Eh |
add edx, 28h |
cmp edx, esi |
jne 00007F9BA46FF579h |
xor eax, eax |
pop esi |
pop ebp |
ret |
mov eax, edx |
jmp 00007F9BA46FF58Bh |
push esi |
call 00007F9BA46FFEECh |
test eax, eax |
je 00007F9BA46FF5B2h |
mov eax, dword ptr fs:[00000018h] |
mov esi, 005721ECh |
mov edx, dword ptr [eax+04h] |
jmp 00007F9BA46FF596h |
cmp edx, eax |
je 00007F9BA46FF5A2h |
xor eax, eax |
mov ecx, edx |
lock cmpxchg dword ptr [esi], ecx |
test eax, eax |
jne 00007F9BA46FF582h |
xor al, al |
pop esi |
ret |
mov al, 01h |
pop esi |
ret |
push ebp |
mov ebp, esp |
cmp dword ptr [ebp+08h], 00000000h |
jne 00007F9BA46FF599h |
mov byte ptr [005721F0h], 00000001h |
call 00007F9BA46FF76Ah |
call 00007F9BA46FFBF9h |
test al, al |
jne 00007F9BA46FF596h |
xor al, al |
pop ebp |
ret |
call 00007F9BA46FFBECh |
test al, al |
jne 00007F9BA46FF59Ch |
push 00000000h |
call 00007F9BA46FFBE1h |
pop ecx |
jmp 00007F9BA46FF57Bh |
mov al, 01h |
pop ebp |
ret |
push ebp |
mov ebp, esp |
cmp byte ptr [005721F1h], 00000000h |
je 00007F9BA46FF596h |
mov al, 01h |
pop ebp |
ret |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x17318c | 0x104 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x174000 | 0x14e3c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x16cd70 | 0x38 | .data |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x16cdc0 | 0x18 | .data |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x16ccb0 | 0x40 | .data |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x173000 | 0x184 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x16a723 | 0x16a800 | 1bfc7c9c27367cf9909e520f007313e1 | False | 0.33425377155172414 | data | 6.004703947953677 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x16c000 | 0x6564 | 0x6200 | a02509725dc2de9ca596adfdf9eb4b49 | False | 0.27144451530612246 | data | 4.414053226945556 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x173000 | 0xdd8 | 0xe00 | 8dda1530378a2027ab77c74ea2449135 | False | 0.41573660714285715 | data | 5.432830471357009 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x174000 | 0x14e3c | 0x15000 | 6361b94c704a21b74e0b037562cd0272 | False | 0.6721772693452381 | data | 6.822739287920647 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | LoadLibraryA, QueryPerformanceFrequency, CreateFileW, GetSystemInfo, GetProcAddress, FreeLibrary, QueryPerformanceCounter, GetTempPathW, WriteFile, CloseHandle, GetModuleHandleW, IsProcessorFeaturePresent, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, GetCurrentProcess, TerminateProcess |
SHELL32.dll | ShellExecuteW |
MSVCP140.dll | ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@M@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@N@Z, ?good@ios_base@std@@QBE_NXZ, ?uncaught_exceptions@std@@YAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Xlength_error@std@@YAXPBD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEXXZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAEHD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QBEDD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@D@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QAE_JPBD_J@Z |
WININET.dll | InternetOpenUrlW, InternetOpenW, InternetReadFile, InternetCloseHandle |
VCRUNTIME140.dll | __current_exception, memcpy, memchr, _CxxThrowException, __std_exception_destroy, __CxxFrameHandler3, memcmp, memmove, __current_exception_context, _except_handler4_common, __std_exception_copy, memset |
api-ms-win-crt-stdio-l1-1-0.dll | __stdio_common_vswprintf_s, __p__commode, _set_fmode |
api-ms-win-crt-heap-l1-1-0.dll | malloc, _callnewh, _set_new_mode, free |
api-ms-win-crt-utility-l1-1-0.dll | rand, srand |
api-ms-win-crt-time-l1-1-0.dll | _time64 |
api-ms-win-crt-runtime-l1-1-0.dll | _exit, exit, _initterm_e, _initterm, _get_narrow_winmain_command_line, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, _seh_filter_exe, terminate, _cexit, _c_exit, _register_thread_local_exe_atexit_callback, _controlfp_s, _initialize_onexit_table, _invalid_parameter_noinfo_noreturn, _register_onexit_function, _crt_atexit |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr, ceil |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T13:17:19.960727+0100 | 2058364 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (grannyejh .lat) | 1 | 192.168.2.5 | 58190 | 1.1.1.1 | 53 | UDP |
2024-12-21T13:17:20.422776+0100 | 2058360 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (discokeyus .lat) | 1 | 192.168.2.5 | 64951 | 1.1.1.1 | 53 | UDP |
2024-12-21T13:17:21.986852+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:21.986852+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:23.478133+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:23.478133+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:24.747780+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:24.747780+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:25.519678+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:25.519678+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:27.065928+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49731 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:27.065928+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49731 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:29.394631+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49741 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:29.394631+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49741 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:31.548202+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49750 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:31.548202+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49750 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:33.876391+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:33.876391+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:34.549518+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:36.710322+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49762 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:36.710322+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49762 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:40.621968+0100 | 2058361 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (discokeyus .lat in TLS SNI) | 1 | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:40.621968+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
2024-12-21T13:17:41.374342+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 13:17:12.963179111 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:12.963227987 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:12.963321924 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:12.982376099 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:12.982395887 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.204956055 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.205079079 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.279571056 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.279614925 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.280582905 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.280664921 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.286468029 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.327351093 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.675729990 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.675843000 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.675936937 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.675998926 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.676021099 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.676069021 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.676103115 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.676147938 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.676182985 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.676227093 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.684160948 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.684216976 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.684257984 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.684307098 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.692543983 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.692636013 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.692711115 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.692770004 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.700989962 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.701075077 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.701145887 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.701200008 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.795430899 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.795505047 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.795557022 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.795613050 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.867935896 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.868030071 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.868069887 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.868132114 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.872185946 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.872256994 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.872275114 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.872324944 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.882647991 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.882824898 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.882843971 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.882895947 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.890492916 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.890569925 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.890588045 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.890633106 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.898284912 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.898365021 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.906064987 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.906150103 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.906184912 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.906254053 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.913959980 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.914041042 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.914073944 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.914120913 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.921617985 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.921705008 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.921730995 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.921787024 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.929474115 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.929543018 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.937417984 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.937484980 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.937500954 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.937556028 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.943511009 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.943573952 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.943597078 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.943650007 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.949244976 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.949299097 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.949413061 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.949462891 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.955271006 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.955364943 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.961194038 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.961275101 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.965173960 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.965235949 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.965292931 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.965341091 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.965354919 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.965373993 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.965399981 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:14.965409040 CET | 443 | 49704 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:14.965428114 CET | 49704 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:15.419471025 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:15.419522047 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:15.419636011 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:15.419970989 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:15.419986010 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:16.714063883 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:16.714155912 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:16.735424042 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:16.735454082 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:16.735670090 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:16.735681057 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.219980001 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220076084 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220113993 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220148087 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220176935 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220181942 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.220207930 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.220243931 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.220264912 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.246006966 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.249883890 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.249910116 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.249967098 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.250418901 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.253865004 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.256419897 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.256485939 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.256496906 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.256555080 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.339754105 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.341892958 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.411895037 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.413897038 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.413924932 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.413996935 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.416384935 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.416465044 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.418253899 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.421865940 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.426006079 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.428906918 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.428921938 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.428981066 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.434355974 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.437872887 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.437886000 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.437961102 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.442735910 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.445864916 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.445871115 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.445918083 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.451472998 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.452958107 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.459521055 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.461870909 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.461877108 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.461927891 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.467828035 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.467914104 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.467958927 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.468364954 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.476270914 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.477010965 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.477024078 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.477085114 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.483817101 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.483916044 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.490840912 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.493879080 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.493915081 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.497872114 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.497884035 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.497906923 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.497981071 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.504846096 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.504910946 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.504935980 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.505028963 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.511912107 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.513067007 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.640697956 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.640712976 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.640758991 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.640790939 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.640805960 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.640846968 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.640866041 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.669524908 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.669557095 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.669614077 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.669683933 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.669723034 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.669745922 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.694544077 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.694576979 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.694628954 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.694694042 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.694735050 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.694757938 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.813116074 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.813152075 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.813225031 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.813292027 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.813342094 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.813363075 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.831846952 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.831878901 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.831980944 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.832010984 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.832099915 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.851761103 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.851792097 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.851867914 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.851878881 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.851916075 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.851938009 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.871004105 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.871037006 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.871119976 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.871174097 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.871203899 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.871354103 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.887696981 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.887732983 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.887820005 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.887861967 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.887912989 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.887913942 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.906974077 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.907008886 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.907052994 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.907107115 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.907143116 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.907248974 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.925092936 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.925163984 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.925215960 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.925244093 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:17.925311089 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:17.925312042 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.013046980 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.013114929 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.013207912 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.013278008 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.013312101 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.013359070 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.025288105 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.025322914 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.025373936 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.025408030 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.025444031 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.025465965 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.038372993 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.038408041 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.038466930 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.038536072 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.038573980 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.038669109 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.051340103 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.051368952 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.051430941 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.051466942 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.051534891 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.062477112 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.062510967 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.062551975 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.062561989 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.062587976 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.062612057 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.074470997 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.074505091 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.074568987 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.074609995 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.074628115 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.074661970 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.085695982 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.085731030 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.085768938 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.085813999 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.085844994 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.085865974 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.195698977 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.195733070 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.195789099 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.195827007 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.195847034 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.195908070 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.203355074 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.203377008 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.203496933 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.203496933 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.203509092 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.203560114 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.211726904 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.211749077 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.211786985 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.211796045 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.211819887 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.211847067 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.219767094 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.219789982 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.219834089 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.219840050 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.219885111 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.219899893 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.224195004 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.224237919 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.224272013 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.224276066 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.224291086 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:18.224323034 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.224347115 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.263999939 CET | 49705 | 443 | 192.168.2.5 | 185.199.110.133 |
Dec 21, 2024 13:17:18.264024019 CET | 443 | 49705 | 185.199.110.133 | 192.168.2.5 |
Dec 21, 2024 13:17:20.764369011 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:20.764415026 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:20.764615059 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:20.766033888 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:20.766046047 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:21.986772060 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:21.986851931 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:22.051582098 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:22.051615000 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:22.051939964 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:22.132844925 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:22.430541039 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:22.430541039 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:22.430757046 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:23.478157043 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:23.478269100 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:23.478390932 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:23.492101908 CET | 49709 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:23.492119074 CET | 443 | 49709 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:23.534964085 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:23.535016060 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:23.535096884 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:23.535541058 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:23.535556078 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:24.747699022 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:24.747780085 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:24.749377012 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:24.749403954 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:24.749671936 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:24.751332045 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:24.751369953 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:24.751420021 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519681931 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519705057 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519742012 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519778013 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519783020 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.519817114 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519872904 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519886017 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.519903898 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.519948959 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.534440041 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.534523964 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.534594059 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.534603119 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.534634113 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.534667969 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.635303020 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.635351896 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.711970091 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.712075949 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.712135077 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.712148905 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.715421915 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.715519905 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.715531111 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.715692997 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.715765953 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.715871096 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.715879917 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.715892076 CET | 49715 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.715898037 CET | 443 | 49715 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.844064951 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.844104052 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:25.844436884 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.844523907 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:25.844535112 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:27.065819979 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:27.065927982 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:27.312617064 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:27.312635899 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:27.313121080 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:27.321050882 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:27.321227074 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:27.321260929 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:28.154067993 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:28.154306889 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:28.155046940 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:28.155502081 CET | 49731 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:28.155517101 CET | 443 | 49731 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:28.178467035 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:28.178508997 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:28.178617001 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:28.178958893 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:28.178971052 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:29.394547939 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:29.394630909 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:29.396408081 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:29.396420002 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:29.397268057 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:29.398459911 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:29.398669958 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:29.398708105 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:29.399885893 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:29.447331905 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:30.258472919 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:30.258553982 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:30.258892059 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:30.259016037 CET | 49741 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:30.259035110 CET | 443 | 49741 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:30.335896015 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:30.335937023 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:30.336085081 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:30.336431980 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:30.336447001 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:31.548125029 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:31.548202038 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:31.549895048 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:31.549910069 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:31.550190926 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:31.560030937 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:31.560219049 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:31.560287952 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:31.560376883 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:31.560389996 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:32.550749063 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:32.550846100 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:32.550916910 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:32.551048994 CET | 49750 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:32.551073074 CET | 443 | 49750 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:32.652653933 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:32.652688026 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:32.652766943 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:32.656883001 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:32.656893969 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:33.876255035 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:33.876390934 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:33.881055117 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:33.881067038 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:33.881381035 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:33.889219046 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:33.889390945 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:33.889395952 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:34.549523115 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:34.549631119 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:34.549738884 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:34.553343058 CET | 49756 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:34.553360939 CET | 443 | 49756 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:35.497153997 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:35.497247934 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:35.497571945 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:35.498075962 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:35.498131037 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.710232973 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.710321903 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.711553097 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.711585045 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.711831093 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.721273899 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.722162008 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.722212076 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.722338915 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.722388983 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.722542048 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.722587109 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.722716093 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.722749949 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.722968102 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.723006010 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.723557949 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.723615885 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.723627090 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.723634958 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.723793030 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.723824024 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:36.723840952 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.723978043 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.724004030 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:36.767337084 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:39.218564987 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:39.218642950 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:39.218874931 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:39.219026089 CET | 49762 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:39.219043970 CET | 443 | 49762 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:39.227533102 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:39.227564096 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:39.227649927 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:39.228852034 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:39.228866100 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:40.621884108 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:40.621968031 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:40.623446941 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:40.623477936 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:40.623753071 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:40.625452995 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:40.625489950 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:40.625530005 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:41.374320030 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:41.374411106 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:41.375034094 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:41.377161026 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:41.377202988 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Dec 21, 2024 13:17:41.377230883 CET | 49773 | 443 | 192.168.2.5 | 172.67.197.170 |
Dec 21, 2024 13:17:41.377248049 CET | 443 | 49773 | 172.67.197.170 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 13:17:12.814019918 CET | 50371 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:12.954610109 CET | 53 | 50371 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 13:17:19.458193064 CET | 55243 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:19.766582012 CET | 53 | 55243 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 13:17:19.960726976 CET | 58190 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:20.270523071 CET | 53 | 58190 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 13:17:20.422775984 CET | 64951 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:20.734309912 CET | 53 | 64951 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 13:17:27.857302904 CET | 62891 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:41.535435915 CET | 65190 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 13:17:55.160456896 CET | 53969 | 53 | 192.168.2.5 | 1.1.1.1 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 21, 2024 13:17:12.814019918 CET | 192.168.2.5 | 1.1.1.1 | 0x7a26 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:19.458193064 CET | 192.168.2.5 | 1.1.1.1 | 0xa91f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:19.960726976 CET | 192.168.2.5 | 1.1.1.1 | 0xed38 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:20.422775984 CET | 192.168.2.5 | 1.1.1.1 | 0xd48 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:27.857302904 CET | 192.168.2.5 | 1.1.1.1 | 0xec05 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:41.535435915 CET | 192.168.2.5 | 1.1.1.1 | 0x25e1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:55.160456896 CET | 192.168.2.5 | 1.1.1.1 | 0x8c61 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 21, 2024 13:17:12.954610109 CET | 1.1.1.1 | 192.168.2.5 | 0x7a26 | No error (0) | 185.199.110.133 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:12.954610109 CET | 1.1.1.1 | 192.168.2.5 | 0x7a26 | No error (0) | 185.199.108.133 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:12.954610109 CET | 1.1.1.1 | 192.168.2.5 | 0x7a26 | No error (0) | 185.199.111.133 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:12.954610109 CET | 1.1.1.1 | 192.168.2.5 | 0x7a26 | No error (0) | 185.199.109.133 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:19.766582012 CET | 1.1.1.1 | 192.168.2.5 | 0xa91f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:20.270523071 CET | 1.1.1.1 | 192.168.2.5 | 0xed38 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 13:17:20.734309912 CET | 1.1.1.1 | 192.168.2.5 | 0xd48 | No error (0) | 172.67.197.170 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:20.734309912 CET | 1.1.1.1 | 192.168.2.5 | 0xd48 | No error (0) | 104.21.21.99 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:27.995652914 CET | 1.1.1.1 | 192.168.2.5 | 0xec05 | No error (0) | crl.root-x1.letsencrypt.org.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:41.774622917 CET | 1.1.1.1 | 192.168.2.5 | 0x25e1 | No error (0) | crl.root-x1.letsencrypt.org.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Dec 21, 2024 13:17:55.467858076 CET | 1.1.1.1 | 192.168.2.5 | 0x8c61 | No error (0) | crl.root-x1.letsencrypt.org.edgekey.net | CNAME (Canonical name) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 185.199.110.133 | 443 | 6008 | C:\Users\user\Desktop\BigProject.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:14 UTC | 156 | OUT | |
2024-12-21 12:17:14 UTC | 900 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN | |
2024-12-21 12:17:14 UTC | 1378 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 185.199.110.133 | 443 | 6008 | C:\Users\user\Desktop\BigProject.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:16 UTC | 155 | OUT | |
2024-12-21 12:17:17 UTC | 902 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN | |
2024-12-21 12:17:17 UTC | 1378 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49709 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:22 UTC | 261 | OUT | |
2024-12-21 12:17:22 UTC | 8 | OUT | |
2024-12-21 12:17:23 UTC | 1128 | IN | |
2024-12-21 12:17:23 UTC | 7 | IN | |
2024-12-21 12:17:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49715 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:24 UTC | 262 | OUT | |
2024-12-21 12:17:24 UTC | 48 | OUT | |
2024-12-21 12:17:25 UTC | 1125 | IN | |
2024-12-21 12:17:25 UTC | 244 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN | |
2024-12-21 12:17:25 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49731 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:27 UTC | 276 | OUT | |
2024-12-21 12:17:27 UTC | 12812 | OUT | |
2024-12-21 12:17:28 UTC | 1132 | IN | |
2024-12-21 12:17:28 UTC | 20 | IN | |
2024-12-21 12:17:28 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49741 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:29 UTC | 278 | OUT | |
2024-12-21 12:17:29 UTC | 15066 | OUT | |
2024-12-21 12:17:30 UTC | 1129 | IN | |
2024-12-21 12:17:30 UTC | 20 | IN | |
2024-12-21 12:17:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49750 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:31 UTC | 271 | OUT | |
2024-12-21 12:17:31 UTC | 15331 | OUT | |
2024-12-21 12:17:31 UTC | 5183 | OUT | |
2024-12-21 12:17:32 UTC | 1131 | IN | |
2024-12-21 12:17:32 UTC | 20 | IN | |
2024-12-21 12:17:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49756 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:33 UTC | 274 | OUT | |
2024-12-21 12:17:33 UTC | 1258 | OUT | |
2024-12-21 12:17:34 UTC | 1122 | IN | |
2024-12-21 12:17:34 UTC | 20 | IN | |
2024-12-21 12:17:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49762 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:36 UTC | 271 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:36 UTC | 15331 | OUT | |
2024-12-21 12:17:39 UTC | 1129 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49773 | 172.67.197.170 | 443 | 7404 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 12:17:40 UTC | 262 | OUT | |
2024-12-21 12:17:40 UTC | 83 | OUT | |
2024-12-21 12:17:41 UTC | 1129 | IN | |
2024-12-21 12:17:41 UTC | 54 | IN | |
2024-12-21 12:17:41 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:17:01 |
Start date: | 21/12/2024 |
Path: | C:\Users\user\Desktop\BigProject.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb40000 |
File size: | 1'600'512 bytes |
MD5 hash: | 98ACEFB3B4D697642895F954C5256A49 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 07:17:14 |
Start date: | 21/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff686a00000 |
File size: | 5'641'176 bytes |
MD5 hash: | 24EAD1C46A47022347DC0F05F6EFBB8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 07:17:15 |
Start date: | 21/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6413e0000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 5 |
Start time: | 07:17:16 |
Start date: | 21/12/2024 |
Path: | C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6413e0000 |
File size: | 3'581'912 bytes |
MD5 hash: | 9B38E8E8B6DD9622D24B53E095C5D9BE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 7 |
Start time: | 07:17:17 |
Start date: | 21/12/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7c0000 |
File size: | 108'664 bytes |
MD5 hash: | 914F728C04D3EDDD5FBA59420E74E56B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 7.4% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 2.8% |
Total number of Nodes: | 71 |
Total number of Limit Nodes: | 6 |
Graph
Function 00C17458 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA488D Relevance: 6.1, APIs: 4, Instructions: 59COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA31B6 Relevance: 1.5, APIs: 1, Instructions: 19COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA3250 Relevance: 1.3, APIs: 1, Instructions: 42COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA53A4 Relevance: 9.1, APIs: 6, Instructions: 70COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA5294 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA4EB1 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA275A Relevance: 7.6, APIs: 5, Instructions: 142COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA3824 Relevance: 7.6, APIs: 5, Instructions: 112COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA24A6 Relevance: 6.0, APIs: 4, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CA2D4F Relevance: 5.1, APIs: 4, Instructions: 69COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 38.4% |
Total number of Nodes: | 318 |
Total number of Limit Nodes: | 9 |
Graph
Function 00437DF0 Relevance: 28.6, APIs: 11, Strings: 5, Instructions: 640memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415799 Relevance: 14.5, APIs: 1, Strings: 7, Instructions: 492encryptionCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409580 Relevance: 9.2, Strings: 7, Instructions: 442COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408850 Relevance: 7.7, APIs: 5, Instructions: 194threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C1F0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C767 Relevance: 1.3, Strings: 1, Instructions: 99COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B70C Relevance: 1.3, Strings: 1, Instructions: 61COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043ECA0 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433CDF Relevance: 3.0, APIs: 2, Instructions: 47COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E4A9 Relevance: 1.6, APIs: 1, Instructions: 106COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436145 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C2C8 Relevance: 1.5, APIs: 1, Instructions: 44COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043C180 Relevance: 1.5, APIs: 1, Instructions: 35memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043169A Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430469 Relevance: 1.5, APIs: 1, Instructions: 22COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C550 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C583 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AAA0 Relevance: 1.5, APIs: 1, Instructions: 13memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AA80 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CB40 Relevance: 10.7, Strings: 8, Instructions: 658COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408F50 Relevance: 9.0, Strings: 7, Instructions: 223COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041E7C0 Relevance: 5.8, Strings: 4, Instructions: 779COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CA49 Relevance: 5.3, Strings: 4, Instructions: 302COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CB22 Relevance: 5.3, Strings: 4, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CAD0 Relevance: 5.3, Strings: 4, Instructions: 295COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CB11 Relevance: 5.3, Strings: 4, Instructions: 271COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417DEE Relevance: 4.7, Strings: 3, Instructions: 998COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041759F Relevance: 4.4, Strings: 3, Instructions: 671COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D380 Relevance: 4.2, Strings: 3, Instructions: 453COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DFE9 Relevance: 4.1, Strings: 3, Instructions: 332COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B2E0 Relevance: 4.0, Strings: 3, Instructions: 231COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DBD9 Relevance: 3.0, Strings: 2, Instructions: 528COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004179C1 Relevance: 2.8, Strings: 2, Instructions: 327COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418591 Relevance: 2.6, Strings: 2, Instructions: 115COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B1D0 Relevance: 1.9, Strings: 1, Instructions: 653COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E30 Relevance: 1.7, Strings: 1, Instructions: 431COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438810 Relevance: 1.7, Strings: 1, Instructions: 426COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416263 Relevance: 1.7, Strings: 1, Instructions: 405COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B170 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D83A Relevance: 1.5, Strings: 1, Instructions: 224COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417380 Relevance: 1.4, Strings: 1, Instructions: 149COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428B61 Relevance: 1.4, Strings: 1, Instructions: 142COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041682D Relevance: .8, Instructions: 761COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074F0 Relevance: .6, Instructions: 611COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004197C2 Relevance: .6, Instructions: 596COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004291DD Relevance: .5, Instructions: 549COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405990 Relevance: .4, Instructions: 448COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415220 Relevance: .4, Instructions: 436COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426B95 Relevance: .4, Instructions: 356COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F330 Relevance: .3, Instructions: 349COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422190 Relevance: .3, Instructions: 330COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043EFB0 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429C2B Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043AEC0 Relevance: .2, Instructions: 237COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004385E0 Relevance: .2, Instructions: 192COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00425E70 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BF14 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435450 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A700 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428D93 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CA93 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423086 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427AD3 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C653 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BFFD Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042984F Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431715 Relevance: 36.9, APIs: 1, Strings: 20, Instructions: 154memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004312D1 Relevance: 36.9, APIs: 1, Strings: 20, Instructions: 150memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|