Windows
Analysis Report
PI1EA8P74K.exe
Overview
General Information
Sample name: | PI1EA8P74K.exerenamed because original name is a hash value |
Original sample name: | 4de5ddc2a970f98efe99dc22c5b2de78.exe |
Analysis ID: | 1582432 |
MD5: | 4de5ddc2a970f98efe99dc22c5b2de78 |
SHA1: | 2dec8ea0a05c5284f0db5573b3608b64bf94375d |
SHA256: | d24037cf570f9b0aa4337a9397eca861d2d3b0891b18a924c9ae6ad466a95de4 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- PI1EA8P74K.exe (PID: 7952 cmdline:
"C:\Users\ user\Deskt op\PI1EA8P 74K.exe" MD5: 4DE5DDC2A970F98EFE99DC22C5B2DE78) - dxdiag.exe (PID: 8016 cmdline:
"C:\Window s\SysWOW64 \dxdiag.ex e" MD5: 24D3F0DB6CCF0C341EA4F6B206DF2EDF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["shapestickyr.lat", "curverpluch.lat", "marbleshinys.click", "talkynicer.lat", "bashfulacid.lat", "wordyfindy.lat", "tentabatte.lat", "manyrestro.lat", "slipperyloo.lat"], "Build id": "ZqchOa--new"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 41 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:16.951297+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:29.522357+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:31.034523+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49845 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:32.407597+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49858 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:33.807369+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 49869 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:36.886737+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 64243 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:38.672375+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 64254 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:41.123431+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.11 | 64270 | 172.67.148.118 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:29.028116+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:30.029059+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:41.627242+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.11 | 64270 | 172.67.148.118 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:29.028116+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:30.029059+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:32.941576+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.11 | 49858 | 172.67.148.118 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00007FF7137527DC |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 311 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 41 Data from Local System | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 311 Process Injection | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 23 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
87% | ReversingLabs | Win32.Exploit.LummaC | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
marbleshinys.click | 172.67.148.118 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.148.118 | marbleshinys.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582432 |
Start date and time: | 2024-12-30 15:54:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PI1EA8P74K.exerenamed because original name is a hash value |
Original Sample Name: | 4de5ddc2a970f98efe99dc22c5b2de78.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/0@1/1 |
EGA Information: | Failed |
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target PI1EA8P74K.exe, PID 7952 because there are no executed function
- Execution Graph export aborted for target dxdiag.exe, PID 8016 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: PI1EA8P74K.exe
Time | Type | Description |
---|---|---|
09:55:27 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LodaRAT, XRed | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
File type: | |
Entropy (8bit): | 7.780281566097344 |
TrID: |
|
File name: | PI1EA8P74K.exe |
File size: | 12'940'800 bytes |
MD5: | 4de5ddc2a970f98efe99dc22c5b2de78 |
SHA1: | 2dec8ea0a05c5284f0db5573b3608b64bf94375d |
SHA256: | d24037cf570f9b0aa4337a9397eca861d2d3b0891b18a924c9ae6ad466a95de4 |
SHA512: | 9d7346b310c1425b826c486773444d68c0cf9df21d1438bffe7eda86c29c09bcd5deb66ad45387b80f06cc261bac6558742c7fde37bb23bbd1987c2f80d3bd82 |
SSDEEP: | 196608:d7WJDMIpNsG+g2t6tDTG1X9TtZf2tXIS867rtnt6rxrWOHecRCwpd:KDMurM6tY0qSXVt6ocoy |
TLSH: | 1BD6E0298A76C9C4F15BA030FCA614638B71F519DBAD99F936620641CFC7032DFDA239 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d.....kg.........."..................'.........@..........................................`........................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x1400527c8 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x676BCCBE [Wed Dec 25 09:13:34 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 7bb4e8cef6a9f350a8f5dc71e7b3773c |
Instruction |
---|
dec eax |
sub esp, 28h |
call 00007F2448C35FC0h |
dec eax |
add esp, 28h |
jmp 00007F2448C35E2Fh |
int3 |
int3 |
dec eax |
mov dword ptr [esp+18h], ebx |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
dec eax |
mov eax, dword ptr [00BB4910h] |
dec eax |
mov ebx, 2DDFA232h |
cdq |
sub eax, dword ptr [eax] |
add byte ptr [eax+3Bh], cl |
ret |
jne 00007F2448C36026h |
dec eax |
and dword ptr [ebp+10h], 00000000h |
dec eax |
lea ecx, dword ptr [ebp+10h] |
call dword ptr [00A6C3B2h] |
dec eax |
mov eax, dword ptr [ebp+10h] |
dec eax |
mov dword ptr [ebp-10h], eax |
call dword ptr [00A6C334h] |
mov eax, eax |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [00A6C320h] |
mov eax, eax |
dec eax |
lea ecx, dword ptr [ebp+18h] |
dec eax |
xor dword ptr [ebp-10h], eax |
call dword ptr [00A6C418h] |
mov eax, dword ptr [ebp+18h] |
dec eax |
lea ecx, dword ptr [ebp-10h] |
dec eax |
shl eax, 20h |
dec eax |
xor eax, dword ptr [ebp+18h] |
dec eax |
xor eax, dword ptr [ebp-10h] |
dec eax |
xor eax, ecx |
dec eax |
mov ecx, FFFFFFFFh |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xabe7b0 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc12000 | 0x1b4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0xc0a000 | 0x4428 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xc13000 | 0x4c524 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x9dbd60 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x9d6280 | 0x140 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xabea78 | 0x2a0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6878a | 0x68800 | a368ee41568424c3f3c0b8c18791568d | False | 0.5257597562799043 | data | 6.766936330294184 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x6a000 | 0xa5925c | 0xa59400 | 4e05a882baaf40f29c81aebd059f8166 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xac4000 | 0x1459c0 | 0x144000 | 9dd19c9b2057765d2627aefd888068cf | False | 0.4261519820601852 | data | 4.724497366288815 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0xc0a000 | 0x4428 | 0x4600 | d5adbcaac954a79474c346b366fdea36 | False | 0.4851004464285714 | data | 5.714887184964475 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.fptable | 0xc0f000 | 0x100 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xc10000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
_RDATA | 0xc11000 | 0x280 | 0x400 | efa049dab2667534f44e1c44ca45f0db | False | 0.28515625 | data | 3.1757690215177306 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0xc12000 | 0x1b4 | 0x200 | 5c9852e239596975f01e05a6614b1fbc | False | 0.486328125 | data | 5.0961877881966595 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xc13000 | 0x4c524 | 0x4c600 | 57341f30cdddff777a6363d9085c0ed4 | False | 0.015410827536824876 | data | 5.431258911581813 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0xc12058 | 0x15b | ASCII text, with CRLF line terminators | English | United States | 0.5446685878962536 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlsAlloc, FlsFree, FlsGetValue, FlsSetValue, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReleaseSRWLockExclusive, RtlCaptureContext, RtlLookupFunctionEntry, RtlPcToFileHeader, RtlUnwindEx, RtlVirtualUnwind, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, VirtualProtect, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T15:55:16.951297+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:29.028116+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:29.028116+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:29.522357+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:30.029059+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:30.029059+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:31.034523+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49845 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:32.407597+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49858 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:32.941576+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.11 | 49858 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:33.807369+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 49869 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:36.886737+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 64243 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:38.672375+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 64254 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:41.123431+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.11 | 64270 | 172.67.148.118 | 443 | TCP |
2024-12-30T15:55:41.627242+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.11 | 64270 | 172.67.148.118 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 15:55:16.475481033 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:16.475541115 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:16.475661993 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:16.483268023 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:16.483306885 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:16.951209068 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:16.951297045 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:17.062865973 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:17.062897921 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:17.063297987 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:17.109038115 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:17.407938957 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:17.408190966 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:17.408221006 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.027844906 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.027937889 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.027995110 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.030339956 CET | 49756 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.030360937 CET | 443 | 49756 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.044615984 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.044644117 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.044760942 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.046056986 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.046066046 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.522205114 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.522356987 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.563458920 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.563477993 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.563821077 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:29.565824032 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.565933943 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:29.565960884 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.028939009 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029055119 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029105902 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029114008 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.029133081 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029164076 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029181004 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.029194117 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029203892 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029243946 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.029279947 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029324055 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.029334068 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029381037 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.029432058 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.029439926 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.077814102 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.119021893 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.119086981 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.119111061 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.119215012 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.119322062 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.119322062 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.119558096 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.119576931 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.119590044 CET | 49837 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.119596004 CET | 443 | 49837 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.522305012 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.522342920 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:30.522418976 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.523144960 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:30.523159981 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.034384966 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.034523010 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.036494017 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.036503077 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.036794901 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.044831038 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.045110941 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.045145988 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.785157919 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.785279036 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.785481930 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.785528898 CET | 49845 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.785535097 CET | 443 | 49845 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.945028067 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.945041895 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:31.945398092 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.945890903 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:31.945903063 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.407510996 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.407597065 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:32.410361052 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:32.410375118 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.411102057 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.422070980 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:32.422363997 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:32.422396898 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.422457933 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:32.467334986 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.941571951 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.941694975 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:32.941782951 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.023469925 CET | 49858 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.023490906 CET | 443 | 49858 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.342485905 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.342525005 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.342621088 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.343200922 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.343214989 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.807291031 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.807368994 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.808921099 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.808928013 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.809170961 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.810852051 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.811062098 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.811091900 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:33.811176062 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:33.811183929 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:34.308660030 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:34.308765888 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:34.308830023 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:34.309237957 CET | 49869 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:34.309252024 CET | 443 | 49869 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.420447111 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.420490026 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.420563936 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.421112061 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.421125889 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.886641026 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.886737108 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.889751911 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.889758110 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.890014887 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:36.892384052 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.892476082 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:36.892481089 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:37.777085066 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:37.777184963 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:37.777364969 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:37.777492046 CET | 64243 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:37.777509928 CET | 443 | 64243 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.210916042 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.210944891 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.211343050 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.211477041 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.211484909 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.672283888 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.672374964 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.715472937 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.715500116 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.715820074 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.717150927 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.718220949 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.718251944 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.718396902 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.718425989 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.718679905 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.718719006 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.718971968 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719002008 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.719141960 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719168901 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.719356060 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719409943 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.719446898 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719451904 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.719609022 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719636917 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.719660997 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719845057 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.719866991 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.727360010 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.728905916 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.728977919 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:38.729021072 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.729078054 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:38.729594946 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:40.637547016 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:40.637630939 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:40.637881994 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:40.638164997 CET | 64254 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:40.638181925 CET | 443 | 64254 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:40.651074886 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:40.651113033 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:40.651381969 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:40.651762009 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:40.651772976 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.123191118 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.123430967 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.124603033 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.124612093 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.124880075 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.126406908 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.126426935 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.126493931 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.627238989 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.627338886 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.627392054 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.628068924 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.628084898 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Dec 30, 2024 15:55:41.628101110 CET | 64270 | 443 | 192.168.2.11 | 172.67.148.118 |
Dec 30, 2024 15:55:41.628107071 CET | 443 | 64270 | 172.67.148.118 | 192.168.2.11 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 15:55:16.442837000 CET | 57847 | 53 | 192.168.2.11 | 1.1.1.1 |
Dec 30, 2024 15:55:16.464736938 CET | 53 | 57847 | 1.1.1.1 | 192.168.2.11 |
Dec 30, 2024 15:55:33.819305897 CET | 53 | 56160 | 1.1.1.1 | 192.168.2.11 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 30, 2024 15:55:16.442837000 CET | 192.168.2.11 | 1.1.1.1 | 0xa5bf | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 30, 2024 15:55:16.464736938 CET | 1.1.1.1 | 192.168.2.11 | 0xa5bf | No error (0) | 172.67.148.118 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 15:55:16.464736938 CET | 1.1.1.1 | 192.168.2.11 | 0xa5bf | No error (0) | 104.21.47.149 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.11 | 49756 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:17 UTC | 265 | OUT | |
2024-12-30 14:55:17 UTC | 8 | OUT | |
2024-12-30 14:55:29 UTC | 1129 | IN | |
2024-12-30 14:55:29 UTC | 7 | IN | |
2024-12-30 14:55:29 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.11 | 49837 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:29 UTC | 266 | OUT | |
2024-12-30 14:55:29 UTC | 45 | OUT | |
2024-12-30 14:55:30 UTC | 1131 | IN | |
2024-12-30 14:55:30 UTC | 238 | IN | |
2024-12-30 14:55:30 UTC | 891 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN | |
2024-12-30 14:55:30 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.11 | 49845 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:31 UTC | 282 | OUT | |
2024-12-30 14:55:31 UTC | 12833 | OUT | |
2024-12-30 14:55:31 UTC | 1128 | IN | |
2024-12-30 14:55:31 UTC | 20 | IN | |
2024-12-30 14:55:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.11 | 49858 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:32 UTC | 277 | OUT | |
2024-12-30 14:55:32 UTC | 15015 | OUT | |
2024-12-30 14:55:32 UTC | 1129 | IN | |
2024-12-30 14:55:32 UTC | 20 | IN | |
2024-12-30 14:55:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.11 | 49869 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:33 UTC | 282 | OUT | |
2024-12-30 14:55:33 UTC | 15331 | OUT | |
2024-12-30 14:55:33 UTC | 5083 | OUT | |
2024-12-30 14:55:34 UTC | 1139 | IN | |
2024-12-30 14:55:34 UTC | 20 | IN | |
2024-12-30 14:55:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.11 | 64243 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:36 UTC | 276 | OUT | |
2024-12-30 14:55:36 UTC | 1174 | OUT | |
2024-12-30 14:55:37 UTC | 1131 | IN | |
2024-12-30 14:55:37 UTC | 20 | IN | |
2024-12-30 14:55:37 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.11 | 64254 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:38 UTC | 281 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:38 UTC | 15331 | OUT | |
2024-12-30 14:55:40 UTC | 1143 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.11 | 64270 | 172.67.148.118 | 443 | 8016 | C:\Windows\SysWOW64\dxdiag.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 14:55:41 UTC | 266 | OUT | |
2024-12-30 14:55:41 UTC | 80 | OUT | |
2024-12-30 14:55:41 UTC | 1121 | IN | |
2024-12-30 14:55:41 UTC | 54 | IN | |
2024-12-30 14:55:41 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:55:13 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\PI1EA8P74K.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff713700000 |
File size: | 12'940'800 bytes |
MD5 hash: | 4DE5DDC2A970F98EFE99DC22C5B2DE78 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 09:55:15 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\dxdiag.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa30000 |
File size: | 222'720 bytes |
MD5 hash: | 24D3F0DB6CCF0C341EA4F6B206DF2EDF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | true |
Function 00007FF7137527DC Relevance: 6.0, APIs: 4, Instructions: 39timethreadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|