Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 5064 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 95FB898CCBB30CC75342F7AFCA4D6FA7)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["necklacebudi.lat", "aspecteirs.lat", "cheapptaxysu.click", "crosshuaht.lat", "grannyejh.lat", "discokeyus.lat", "energyaffai.lat", "rapeflowwj.lat", "sustainskelet.lat"], "Build id": "CZJvss--"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:11.705797+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:13.384040+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:15.763280+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:18.097450+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:20.402504+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49739 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:22.990797+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:25.708628+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:29.504298+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:12.138300+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:14.151154+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:30.269322+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:12.138300+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:14.151154+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:18.931023+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 172.67.177.88 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Code function: | 0_3_00B5E098 | |
Source: | Code function: | 0_3_00B678C1 | |
Source: | Code function: | 0_3_00B5E227 | |
Source: | Code function: | 0_3_00B5CE21 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_3_00B75BA7 | |
Source: | Code function: | 0_3_00B75BA7 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B34EB2 | |
Source: | Code function: | 0_3_00B34F12 | |
Source: | Code function: | 0_3_00B34ED2 | |
Source: | Code function: | 0_3_00B5E625 | |
Source: | Code function: | 0_3_00B5CD18 | |
Source: | Code function: | 0_3_00B5C820 | |
Source: | Code function: | 0_3_00B75BA7 | |
Source: | Code function: | 0_3_00B75BA7 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B88BA9 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B89159 | |
Source: | Code function: | 0_3_00B6C1A7 | |
Source: | Code function: | 0_3_00B6C1A7 | |
Source: | Code function: | 0_3_00B6C1A7 | |
Source: | Code function: | 0_3_00B75BA7 | |
Source: | Code function: | 0_3_00B75BA7 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 121 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 11 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
35% | Virustotal | Browse | ||
37% | ReversingLabs | Win32.Spyware.Lummastealer |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cheapptaxysu.click | 172.67.177.88 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.177.88 | cheapptaxysu.click | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580155 |
Start date and time: | 2024-12-24 02:58:04 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 44s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Setup.exe, PID 5064 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
20:59:11 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.177.88 | Get hash | malicious | ScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar | Browse | ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse | |||
Get hash | malicious | Phisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cheapptaxysu.click | Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc | Browse |
| |
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, RHADAMANTHYS, zgRAT | Browse |
| ||
Get hash | malicious | ScreenConnect Tool, LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 6.592135892516571 |
TrID: |
|
File name: | Setup.exe |
File size: | 3'467'041 bytes |
MD5: | 95fb898ccbb30cc75342f7afca4d6fa7 |
SHA1: | 85caaaeab8f4bc0be8d29002081fbce0c37820fe |
SHA256: | ce6becb9c924feaa5d1b27fa38252d24f3447562317bc2b1ba261d771b50e628 |
SHA512: | f03e2d798dad78885c6ac2c39f55428d83b1ec10093ba1367aa2595380b8e9966ba426866ec93e172d292e11d955c51d2b771fe4c9048812535304f39cf04a7b |
SSDEEP: | 49152:gWstLBcXqFpBR6SVb8kq4pgquLMMji4NYxtJpkxhGjIHTbVWhQC:StLutqgwh4NYxtJpkxhGhhQC |
TLSH: | B9F55B17B38C613ED06B3B364A73C690983BFA617A128D1797F45D0C8F3A5902A3E657 |
File Content Preview: | MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | 870147476127061f |
Entrypoint: | 0x6c6668 |
Entrypoint Section: | .itext |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x63ECF219 [Wed Feb 15 14:54:17 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 1 |
File Version Major: | 6 |
File Version Minor: | 1 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 1 |
Import Hash: | 8507116e3d0e7e02e36e7dc5b8aa1af8 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | F87B1BFA8FFB860CE59A8D63EC60262F |
Thumbprint SHA-1: | 607A3EDAA64933E94422FC8F0C80388E0590986C |
Thumbprint SHA-256: | 2029505D14BAF18AF60A0D1A7D8B56447DB643B32FAA849D4C08D2AB1FF3A4FD |
Serial: | 0B50CF246B263EFD85A729315158F3FF |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
push esi |
push edi |
mov eax, 006BABB4h |
call 00007FC0C8248722h |
mov eax, dword ptr [006CFF3Ch] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000188h] |
push FFFFFFECh |
push eax |
call 00007FC0C824CABDh |
mov edx, dword ptr [006CFF3Ch] |
mov edx, dword ptr [edx] |
mov edx, dword ptr [edx+00000188h] |
and eax, FFFFFF7Fh |
push eax |
push FFFFFFECh |
push edx |
call 00007FC0C824CAA9h |
xor eax, eax |
push ebp |
push 006C66F9h |
push dword ptr fs:[eax] |
mov dword ptr fs:[eax], esp |
push 00000001h |
call 00007FC0C824BE04h |
call 00007FC0C84F244Bh |
mov eax, dword ptr [006BA7DCh] |
push eax |
push 006BA874h |
mov eax, dword ptr [006CFF3Ch] |
mov eax, dword ptr [eax] |
call 00007FC0C83F0270h |
mov eax, 006B5454h |
mov edx, dword ptr [006CFDB4h] |
mov dword ptr [edx], eax |
call 00007FC0C84F2492h |
xor eax, eax |
pop edx |
pop ecx |
pop ecx |
mov dword ptr fs:[eax], edx |
jmp 00007FC0C84FE20Bh |
jmp 00007FC0C8241027h |
call 00007FC0C84F21DAh |
mov eax, 00000001h |
call 00007FC0C8241B10h |
call 00007FC0C824146Bh |
mov eax, dword ptr [006CFF3Ch] |
mov eax, dword ptr [eax] |
mov edx, 006C688Ch |
call 00007FC0C83EFD3Ah |
push 00000005h |
mov eax, dword ptr [006CFF3Ch] |
mov eax, dword ptr [eax] |
mov eax, dword ptr [eax+00000188h] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x2de000 | 0x97 | .edata |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2d9000 | 0x39ba | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x2e1000 | 0x70a00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x349da1 | 0x4980 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2e0000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2d99f0 | 0x8c4 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x2dd000 | 0xbde | .didata |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2c20c8 | 0x2c2200 | 0484a41ef5ad9dba276e3b4d7aab4d55 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.itext | 0x2c4000 | 0x2898 | 0x2a00 | 14817d9596460398ce8a10ec41885658 | False | 0.5013950892857143 | data | 6.097600196485659 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x2c7000 | 0x9258 | 0x9400 | b6c68a9cc08d787f829bebe13beeebce | False | 0.576198268581081 | data | 6.2228077637398 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.bss | 0x2d1000 | 0x790c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x2d9000 | 0x39ba | 0x3a00 | 1c7fac207b7708f2d38f3eced48727dc | False | 0.3355334051724138 | data | 5.289106478125697 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.didata | 0x2dd000 | 0xbde | 0xc00 | 022cbd8e7ebbfb3df44dfd43f92fa718 | False | 0.3512369791666667 | data | 4.391276161587863 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.edata | 0x2de000 | 0x97 | 0x200 | 29372b5d9fa8b5b431a37756aee4c5b7 | False | 0.25 | data | 1.8458344781090077 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.tls | 0x2df000 | 0x4c | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x2e0000 | 0x5d | 0x200 | 0e147eb88402eb8a56f168b457309291 | False | 0.189453125 | data | 1.3507743158343073 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x2e1000 | 0x70a00 | 0x70a00 | 661724ecf8956e450a5bd373b2e06432 | False | 0.5411890434239733 | data | 6.957816337132757 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x2e1be0 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | English | United States | 0.38636363636363635 |
RT_CURSOR | 0x2e1d14 | 0x134 | data | English | United States | 0.4642857142857143 |
RT_CURSOR | 0x2e1e48 | 0x134 | data | English | United States | 0.4805194805194805 |
RT_CURSOR | 0x2e1f7c | 0x134 | data | English | United States | 0.38311688311688313 |
RT_CURSOR | 0x2e20b0 | 0x134 | data | English | United States | 0.36038961038961037 |
RT_CURSOR | 0x2e21e4 | 0x134 | data | English | United States | 0.4090909090909091 |
RT_CURSOR | 0x2e2318 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | English | United States | 0.4967532467532468 |
RT_ICON | 0x2e244c | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 30236 x 30236 px/m | English | United States | 0.09360582041878623 |
RT_STRING | 0x2f2c74 | 0x210 | data | 0.3125 | ||
RT_STRING | 0x2f2e84 | 0x440 | data | 0.37683823529411764 | ||
RT_STRING | 0x2f32c4 | 0x2b4 | data | 0.45809248554913296 | ||
RT_STRING | 0x2f3578 | 0x214 | data | 0.4605263157894737 | ||
RT_STRING | 0x2f378c | 0x3e4 | data | 0.3885542168674699 | ||
RT_STRING | 0x2f3b70 | 0x3a0 | data | 0.4191810344827586 | ||
RT_STRING | 0x2f3f10 | 0x1ec | data | 0.5609756097560976 | ||
RT_STRING | 0x2f40fc | 0xcc | data | 0.6666666666666666 | ||
RT_STRING | 0x2f41c8 | 0x294 | data | 0.4681818181818182 | ||
RT_STRING | 0x2f445c | 0x3e8 | data | 0.372 | ||
RT_STRING | 0x2f4844 | 0x488 | data | 0.41293103448275864 | ||
RT_STRING | 0x2f4ccc | 0x418 | data | 0.28435114503816794 | ||
RT_STRING | 0x2f50e4 | 0x370 | data | 0.4147727272727273 | ||
RT_STRING | 0x2f5454 | 0x39c | data | 0.41233766233766234 | ||
RT_STRING | 0x2f57f0 | 0x4a4 | data | 0.382996632996633 | ||
RT_STRING | 0x2f5c94 | 0x384 | data | 0.37333333333333335 | ||
RT_STRING | 0x2f6018 | 0x454 | data | 0.3935018050541516 | ||
RT_STRING | 0x2f646c | 0x210 | data | 0.39015151515151514 | ||
RT_STRING | 0x2f667c | 0xbc | data | 0.6542553191489362 | ||
RT_STRING | 0x2f6738 | 0x100 | data | 0.62890625 | ||
RT_STRING | 0x2f6838 | 0x338 | data | 0.4223300970873786 | ||
RT_STRING | 0x2f6b70 | 0x3f0 | data | 0.34226190476190477 | ||
RT_STRING | 0x2f6f60 | 0x314 | data | 0.38578680203045684 | ||
RT_STRING | 0x2f7274 | 0x2f8 | data | 0.38026315789473686 | ||
RT_RCDATA | 0x2f756c | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x2f757c | 0x1800 | PE32+ executable (console) x86-64, for MS Windows | English | United States | 0.3924153645833333 |
RT_RCDATA | 0x2f8d7c | 0xb70 | data | 0.5358606557377049 | ||
RT_RCDATA | 0x2f98ec | 0x147 | Delphi compiled form 'TMainForm' | 0.746177370030581 | ||
RT_RCDATA | 0x2f9a34 | 0x480 | Delphi compiled form 'TNewDiskForm' | 0.5052083333333334 | ||
RT_RCDATA | 0x2f9eb4 | 0x400 | Delphi compiled form 'TSelectFolderForm' | 0.5087890625 | ||
RT_RCDATA | 0x2fa2b4 | 0x4b5 | Delphi compiled form 'TSelectLanguageForm' | 0.5004149377593361 | ||
RT_RCDATA | 0x2fa76c | 0x7e3 | Delphi compiled form 'TUninstallProgressForm' | 0.40713224368499257 | ||
RT_RCDATA | 0x2faf50 | 0x55c | Delphi compiled form 'TUninstSharedFileForm' | 0.41690962099125367 | ||
RT_RCDATA | 0x2fb4ac | 0x2ac9 | Delphi compiled form 'TWizardForm' | 0.19811923673879303 | ||
RT_GROUP_CURSOR | 0x2fdf78 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x2fdf8c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.25 |
RT_GROUP_CURSOR | 0x2fdfa0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x2fdfb4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x2fdfc8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x2fdfdc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x2fdff0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_ICON | 0x2fe004 | 0x14 | data | English | United States | 1.15 |
RT_VERSION | 0x2fe018 | 0x514 | data | English | United States | 0.28846153846153844 |
RT_MANIFEST | 0x2fe52c | 0x7a8 | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.3836734693877551 |
DLL | Import |
---|---|
mpr.dll | WNetEnumResourceW, WNetGetUniversalNameW, WNetGetConnectionW, WNetCloseEnum, WNetOpenEnumW |
comdlg32.dll | GetSaveFileNameW, GetOpenFileNameW |
comctl32.dll | FlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, FlatSB_SetScrollProp, ImageList_GetDragImage, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, FlatSB_GetScrollInfo, ImageList_Write, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_Draw, ImageList_Remove |
shell32.dll | SHBrowseForFolderW, SHGetMalloc, SHGetFileInfoW, SHChangeNotify, Shell_NotifyIconW, ShellExecuteW, SHGetPathFromIDListW, ShellExecuteExW |
user32.dll | CopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, GetMessageW, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, ScrollWindowEx, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, OffsetRect, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, GetSystemMenu, WaitForInputIdle, ShowOwnedPopups, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, InflateRect, GetKeyboardLayoutList, OemToCharBuffA, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, SendNotifyMessageW, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, SetWindowLongW, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, ClientToScreen, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ExitWindowsEx, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, GetClassLongW, ActivateKeyboardLayout, GetParent, CharToOemBuffA, DrawTextW, SetScrollRange, InsertMenuItemW, PeekMessageA, GetPropW, SetClassLongW, MessageBoxW, MessageBeep, SetPropW, SetRectEmpty, UpdateWindow, RemovePropW, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, SendMessageTimeoutW, BringWindowToTop, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowPos, SetWindowRgn, GetMenuItemCount, RemoveMenu, AppendMenuW, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, DestroyCursor, ReplyMessage, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, LoadImageW, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowLongW, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, FindWindowW, DeleteMenu, GetKeyboardLayout |
version.dll | GetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW |
oleaut32.dll | SafeArrayPutElement, LoadTypeLib, GetErrorInfo, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, SafeArrayCreate, SafeArrayGetElement, GetActiveObject, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopy, RegisterTypeLib, VariantChangeType, VariantCopyInd |
advapi32.dll | RegSetValueExW, ConvertStringSecurityDescriptorToSecurityDescriptorW, OpenThreadToken, GetUserNameW, RegQueryInfoKeyW, EqualSid, GetTokenInformation, RegCreateKeyExW, SetSecurityDescriptorDacl, RegEnumKeyExW, AdjustTokenPrivileges, RegDeleteKeyW, LookupPrivilegeValueW, RegOpenKeyExW, OpenProcessToken, FreeSid, AllocateAndInitializeSid, RegDeleteValueW, RegFlushKey, RegEnumValueW, RegQueryValueExW, ConvertSidToStringSidW, RegCloseKey, InitializeSecurityDescriptor |
netapi32.dll | NetWkstaGetInfo, NetApiBufferFree |
msvcrt.dll | memcpy |
winhttp.dll | WinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption |
kernel32.dll | SetFileAttributesW, SetFileTime, GetACP, GetExitCodeProcess, IsBadWritePtr, CloseHandle, LocalFree, GetCurrentProcessId, SizeofResource, VirtualProtect, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, HeapAlloc, ExitProcess, WriteProfileStringW, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, GetModuleHandleW, FreeLibrary, HeapDestroy, CompareFileTime, ReadFile, CreateProcessW, TransactNamedPipe, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, OpenMutexW, CreateThread, CompareStringW, CopyFileW, CreateMutexW, LoadLibraryA, ResetEvent, MulDiv, FreeResource, GetDriveTypeW, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, GetSystemTimeAsFileTime, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, OutputDebugStringW, GetCurrentThread, GetLogicalDrives, LocalFileTimeToFileTime, SetNamedPipeHandleState, LoadLibraryExW, TerminateProcess, LockResource, FileTimeToSystemTime, GetShortPathNameW, GetCurrentThreadId, UnhandledExceptionFilter, MoveFileExW, GlobalFindAtomW, VirtualQuery, GlobalFree, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, ReleaseMutex, FlushFileBuffers, LoadResource, SuspendThread, GetTickCount, WritePrivateProfileStringW, GetFileSize, GlobalDeleteAtom, GetStartupInfoW, GetFileAttributesW, GetCurrentDirectoryW, SetCurrentDirectoryW, InitializeCriticalSection, GetSystemWindowsDirectoryW, GetThreadPriority, GetCurrentProcess, SetThreadPriority, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, DeviceIoControl, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, lstrcmpW, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetEnvironmentVariableW, GetLocalTime, WaitForSingleObject, WriteFile, CreateNamedPipeW, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, IsValidLocale, TlsSetValue, CreateDirectoryW, GetOverlappedResult, GetSystemDefaultUILanguage, EnumCalendarInfoW, GetProfileStringW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, IsDBCSLeadByte, CreateEventW, GetPrivateProfileStringW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale |
ole32.dll | StgCreateDocfileOnILockBytes, CoCreateInstance, CLSIDFromString, CoUninitialize, IsEqualGUID, OleInitialize, CoFreeUnusedLibraries, CreateILockBytesOnHGlobal, CLSIDFromProgID, OleUninitialize, CoDisconnectObject, CoInitialize, CoTaskMemFree, CoTaskMemAlloc, StringFromCLSID |
gdi32.dll | Arc, Pie, SetBkMode, SelectPalette, CreateCompatibleBitmap, ExcludeClipRect, RectVisible, SetWindowOrgEx, MaskBlt, AngleArc, Chord, SetTextColor, StretchBlt, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, RemoveFontResourceW, GetWindowOrgEx, CreatePalette, CreateBrushIndirect, PatBlt, LineDDA, PolyBezierTo, GetStockObject, CreateSolidBrush, Polygon, Rectangle, MoveToEx, DeleteDC, SaveDC, BitBlt, Ellipse, FrameRgn, GetDeviceCaps, GetBitmapBits, GetTextExtentPoint32W, GetClipBox, Polyline, IntersectClipRect, GetSystemPaletteEntries, CreateBitmap, AddFontResourceW, CreateDIBitmap, GetStretchBltMode, CreateDIBSection, CreatePenIndirect, SetStretchBltMode, GetDIBits, CreateFontIndirectW, PolyBezier, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, DeleteObject, SelectObject, ExtFloodFill, UnrealizeObject, SetBkColor, CreateCompatibleDC, GetObjectW, GetBrushOrgEx, GetCurrentPositionEx, SetROP2, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, ArcTo, GdiFlush, SetPixel, EnumFontFamiliesExW, GetPaletteEntries |
Name | Ordinal | Address |
---|---|---|
TMethodImplementationIntercept | 3 | 0x4b5e78 |
__dbk_fcall_wrapper | 2 | 0x410a7c |
dbkFCallWrapperAddr | 1 | 0x6d4640 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-24T02:59:11.705797+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:12.138300+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:12.138300+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:13.384040+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:14.151154+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:14.151154+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:15.763280+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:18.097450+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:18.931023+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49736 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:20.402504+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49739 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:22.990797+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:25.708628+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:29.504298+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
2024-12-24T02:59:30.269322+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:59:10.483886957 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:10.483962059 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:10.484070063 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:10.487009048 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:10.487021923 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:11.705600023 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:11.705796957 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:11.709002972 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:11.709011078 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:11.709364891 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:11.752057076 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:11.755820036 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:11.755853891 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:11.755888939 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138324022 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138771057 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138820887 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138875961 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138932943 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.138967991 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138988018 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.138994932 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.139038086 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.140412092 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.140434980 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.140455008 CET | 49731 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.140461922 CET | 443 | 49731 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.168549061 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.168597937 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:12.168690920 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.168940067 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:12.168953896 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:13.383644104 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:13.384040117 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:13.386451960 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:13.386477947 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:13.386811018 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:13.388039112 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:13.388039112 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:13.388127089 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.151160002 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.151768923 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.151809931 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.151844978 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.151896954 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.151959896 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.152343035 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.161142111 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.161209106 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.161226034 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.169441938 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.169513941 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.169537067 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.220705986 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.220741034 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.267590046 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.270721912 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.274877071 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.274931908 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.274945974 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.314481974 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.343090057 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.346970081 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.347026110 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.347040892 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.347074032 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.347135067 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.347219944 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.347264051 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.347296953 CET | 49732 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.347331047 CET | 443 | 49732 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.550194979 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.550275087 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:14.550373077 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.550750017 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:14.550797939 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:15.763185978 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:15.763279915 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:15.764379978 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:15.764411926 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:15.764638901 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:15.765897989 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:15.766069889 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:15.766109943 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:15.766181946 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:15.766197920 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:16.726933002 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:16.727006912 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:16.727200985 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:16.727278948 CET | 49734 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:16.727334976 CET | 443 | 49734 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:16.864381075 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:16.864475965 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:16.864554882 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:16.865288973 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:16.865324974 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.097366095 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.097450018 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.098556995 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.098587036 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.098809004 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.099936962 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.100056887 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.100097895 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.931040049 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.931111097 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:18.931165934 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.931294918 CET | 49736 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:18.931327105 CET | 443 | 49736 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:19.189156055 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:19.189184904 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:19.189404964 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:19.189857006 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:19.189868927 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:20.402432919 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:20.402503967 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:20.408308029 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:20.408320904 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:20.408523083 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:20.418625116 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:20.418878078 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:20.418909073 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:20.418965101 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:20.418973923 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:21.426827908 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:21.426929951 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:21.427092075 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:21.427184105 CET | 49739 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:21.427223921 CET | 443 | 49739 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:21.775633097 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:21.775736094 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:21.775819063 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:21.776097059 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:21.776130915 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:22.990704060 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:22.990797043 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:22.992021084 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:22.992048025 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:22.992264032 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:23.003262997 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:23.003336906 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:23.003349066 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:23.755888939 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:23.756007910 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:23.756177902 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:23.756177902 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:24.064486980 CET | 49741 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:24.064537048 CET | 443 | 49741 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:24.496176004 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:24.496246099 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:24.496486902 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:24.496835947 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:24.496867895 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.708497047 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.708627939 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.709999084 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.710012913 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.710220098 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.751985073 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.791809082 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.792581081 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.792629957 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.792764902 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.792814016 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.792968035 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.793045998 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.793211937 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.793265104 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.793459892 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.793513060 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.793735981 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.793776035 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.793792963 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.793822050 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.794003010 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.794040918 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.794085026 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.794244051 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.794286966 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.839340925 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.839601040 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.839658022 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.839700937 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.839730024 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:25.839757919 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:25.839772940 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:28.170816898 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:28.170902967 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:28.170967102 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:28.171062946 CET | 49743 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:28.171111107 CET | 443 | 49743 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:28.292509079 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:28.292572975 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:28.292690039 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:28.292958975 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:28.292977095 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:29.504221916 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:29.504297972 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:29.505614996 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:29.505625963 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:29.505831957 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:29.507143021 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:29.507164955 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:29.507204056 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:30.269315958 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:30.269403934 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:30.269650936 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:30.269867897 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:30.269895077 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Dec 24, 2024 02:59:30.269912958 CET | 49744 | 443 | 192.168.2.4 | 172.67.177.88 |
Dec 24, 2024 02:59:30.269925117 CET | 443 | 49744 | 172.67.177.88 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 24, 2024 02:59:10.170408010 CET | 54994 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 24, 2024 02:59:10.479032993 CET | 53 | 54994 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:59:10.170408010 CET | 192.168.2.4 | 1.1.1.1 | 0xbd89 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 24, 2024 02:59:10.479032993 CET | 1.1.1.1 | 192.168.2.4 | 0xbd89 | No error (0) | 172.67.177.88 | A (IP address) | IN (0x0001) | false | ||
Dec 24, 2024 02:59:10.479032993 CET | 1.1.1.1 | 192.168.2.4 | 0xbd89 | No error (0) | 104.21.67.146 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:11 UTC | 265 | OUT | |
2024-12-24 01:59:11 UTC | 8 | OUT | |
2024-12-24 01:59:12 UTC | 572 | IN | |
2024-12-24 01:59:12 UTC | 797 | IN | |
2024-12-24 01:59:12 UTC | 1369 | IN | |
2024-12-24 01:59:12 UTC | 1369 | IN | |
2024-12-24 01:59:12 UTC | 1021 | IN | |
2024-12-24 01:59:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:13 UTC | 355 | OUT | |
2024-12-24 01:59:13 UTC | 42 | OUT | |
2024-12-24 01:59:14 UTC | 1132 | IN | |
2024-12-24 01:59:14 UTC | 237 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN | |
2024-12-24 01:59:14 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:15 UTC | 366 | OUT | |
2024-12-24 01:59:15 UTC | 15331 | OUT | |
2024-12-24 01:59:15 UTC | 2785 | OUT | |
2024-12-24 01:59:16 UTC | 1131 | IN | |
2024-12-24 01:59:16 UTC | 20 | IN | |
2024-12-24 01:59:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49736 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:18 UTC | 369 | OUT | |
2024-12-24 01:59:18 UTC | 8761 | OUT | |
2024-12-24 01:59:18 UTC | 1143 | IN | |
2024-12-24 01:59:18 UTC | 20 | IN | |
2024-12-24 01:59:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49739 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:20 UTC | 363 | OUT | |
2024-12-24 01:59:20 UTC | 15331 | OUT | |
2024-12-24 01:59:20 UTC | 5041 | OUT | |
2024-12-24 01:59:21 UTC | 1140 | IN | |
2024-12-24 01:59:21 UTC | 20 | IN | |
2024-12-24 01:59:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:23 UTC | 372 | OUT | |
2024-12-24 01:59:23 UTC | 1248 | OUT | |
2024-12-24 01:59:23 UTC | 1135 | IN | |
2024-12-24 01:59:23 UTC | 20 | IN | |
2024-12-24 01:59:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49743 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:25 UTC | 375 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:25 UTC | 15331 | OUT | |
2024-12-24 01:59:28 UTC | 1147 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49744 | 172.67.177.88 | 443 | 5064 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-24 01:59:29 UTC | 355 | OUT | |
2024-12-24 01:59:29 UTC | 77 | OUT | |
2024-12-24 01:59:30 UTC | 1124 | IN | |
2024-12-24 01:59:30 UTC | 54 | IN | |
2024-12-24 01:59:30 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 20:58:55 |
Start date: | 23/12/2024 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 3'467'041 bytes |
MD5 hash: | 95FB898CCBB30CC75342F7AFCA4D6FA7 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Function 00B678C1 Relevance: 3.1, Strings: 2, Instructions: 612COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5E098 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5CE21 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B5E227 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|