Windows Analysis Report hTu8FeYy28.exe
Overview
General Information
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Process Tree |
---|
|
Malware Configuration |
---|
Threatname: Clipboard Hijacker |
---|
{"Crypto Addresses": ["Ae2tdPwUPEZDqNhACJ3ZT5NdXjkNffGAwa4Mc9N87udKWYzt1VnFngLMnPE", "addr1q9clx0ud02ehvzuqqtqu4tchl6g9kkzllcl2zjpan9kp39m37vlc674nwc9cqqkpe2h30l5stdv9ll3759yrmxtvrztspanadd", "bc1q7hrr7lvjrgdcskmnydwry3629c73qfx9gpk2mc", "cosmos1l8p5237wclrtqf8upw8quwuj32f30zv8gej0jc", "ltc1q0jyf5za7n5pxuz8tgvhzjkaaf5cz5kykp5cd55", "D7Dhy317Lph7ZAx4GALQtYdzcFrx35GSNK", "AYFTxSxSzjDWb2D3fs4TjjsswB41M6Tw6T", "7UT25554RQSTW2S44UVFYWZIZDWQIKUT3O7LG4QBOYDJ7IIEBVFYZZW4YI", "MFxCfYKXwLG1eM93xuNoNCzLoy7an3Ekud", "00000L0000T00MON00000000000000000000000LZRNV3CB6Ei9bZtXDQ2k6Sy7emnNX4rzTQ00000000000000W0000000", "D2eMjtv3Fh2EnsZ8SH4FCyvwxNawtpHDxXzBgS4sME4M", "0x4b222739496bcf2AA1F609585dACd8858943B39c", "84VKKNB6tQLam7LPn9PTdKYUfZepoYTfmMMYFEa7btqs7XMqyPWpMdq9FGSvZKsVNgDddtC5JTr1p3ACp9Cbod2f8KABjkw", "CH4PG3PB-6HT2VI9C-O2NL2NO5-QP1BW0EG", "t3SCmhgjNi8B5amJUw61Tc86B9CsTTJvPy7", "TM5d5ZK4uEDe3Ry8gy35nTQLcswbHDzS95", "18SJmQtHkoRMaaJSCPHn85u5dgTXTiDBZN", "Z18SJmQtHkoRMaaJSCPHn85u5dgTXTiDBZN", "3JxVQHXyiwwws3Yykkw2sUbRNkgimDi725", "bnb1xw6czzmz0arvpf88ufwj4k0yfwfd8vps9f43xu", "LZRNV3CB6Ei9bZtXDQ2k6Sy7emnNX4rzTQ"]}
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security |
Unpacked PEs |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security | ||
JoeSecurity_Clipboard_Hijacker | Yara detected Clipboard Hijacker | Joe Security |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Jbx Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Found malware configuration | Show sources |
Source: | Malware Configuration Extractor: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link |
Source: | Avira: | ||
Source: | Avira: |
Compliance: |
---|
Detected unpacking (overwrites its own PE header) | Show sources |
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | JA3 fingerprint: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 17_2_00401FEF |
Source: | Code function: | 17_2_00401F8B |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Process created: |
Source: | Dropped File: |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Process created: |
Source: | Classification label: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Window detected: |
Source: | Static file information: |
Data Obfuscation: |
---|
Detected unpacking (changes PE section rights) | Show sources |
Source: | Unpacked PE file: |
Detected unpacking (overwrites its own PE header) | Show sources |
Source: | Unpacked PE file: |
Source: | Code function: | 17_2_00401000 |
Source: | File created: | Jump to dropped file |
Boot Survival: |
---|
Uses schtasks.exe or at.exe to add and modify task schedules | Show sources |
Source: | Process created: |
Source: | Code function: | 17_2_00401000 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion: |
---|
Contains functionality to compare user and computer (likely to detect sandboxes) | Show sources |
Source: | Code function: | 17_2_00401272 |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 17_2_00401000 |
HIPS / PFW / Operating System Protection Evasion: |
---|
Injects a PE file into a foreign processes | Show sources |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Stealing of Sensitive Information: |
---|
Yara detected Clipboard Hijacker | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scheduled Task/Job1 | Scheduled Task/Job1 | Process Injection112 | Masquerading1 | OS Credential Dumping | Security Software Discovery1 | Remote Services | Clipboard Data2 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scripting1 | Application Shimming1 | Scheduled Task/Job1 | Modify Registry1 | LSASS Memory | Process Discovery1 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Ingress Tool Transfer1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | Native API1 | Logon Script (Windows) | Application Shimming1 | Process Injection112 | Security Account Manager | Remote System Discovery1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Non-Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Scripting1 | NTDS | System Information Discovery11 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Application Layer Protocol3 | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing21 | LSA Secrets | Remote System Discovery | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
12% | Virustotal | Browse |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | HEUR/AGEN.1131223 | Download File | ||
100% | Avira | TR/ATRAPS.Gen | Download File | ||
100% | Avira | TR/ATRAPS.Gen | Download File |
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cdn.discordapp.com | 162.159.130.233 | true | false | high |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
162.159.130.233 | cdn.discordapp.com | United States | 13335 | CLOUDFLARENETUS | false |
General Information |
---|
Joe Sandbox Version: | 33.0.0 White Diamond |
Analysis ID: | 499635 |
Start date: | 08.10.2021 |
Start time: | 17:49:04 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 9m 4s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | hTu8FeYy28.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 32 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal92.spyw.evad.winEXE@21/8@1/1 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
17:51:49 | API Interceptor | |
17:51:53 | Task Scheduler |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
162.159.130.233 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Domains |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
cdn.discordapp.com | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Dropped Files |
---|
Created / dropped Files |
---|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 155 |
Entropy (8bit): | 4.687076340713226 |
Encrypted: | false |
SSDEEP: | 3:LjT5LJJFIf9oM3KN6QNb3DM9bWQqA5SkrF2VCceGAFddGeWLCXlRA3+OR:rz81R3KnMMQ75ieGgdEYlRA/R |
MD5: | 213C60ADF1C9EF88DC3C9B2D579959D2 |
SHA1: | E4D2AD7B22B1A8B5B1F7A702B303C7364B0EE021 |
SHA-256: | 37C59C8398279916CFCE45F8C5E3431058248F5E3BEF4D9F5C0F44A7D564F82E |
SHA-512: | FE897D9CAA306B0E761B2FD61BB5DC32A53BFAAD1CE767C6860AF4E3AD59C8F3257228A6E1072DAB0F990CB51C59C648084BA419AC6BC5C0A99BDFFA569217B7 |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34 |
Entropy (8bit): | 4.314972767530033 |
Encrypted: | false |
SSDEEP: | 3:LjTnaHF5wlM:rnaHSM |
MD5: | 4068C9F69FCD8A171C67F81D4A952A54 |
SHA1: | 4D2536A8C28CDCC17465E20D6693FB9E8E713B36 |
SHA-256: | 24222300C78180B50ED1F8361BA63CB27316EC994C1C9079708A51B4A1A9D810 |
SHA-512: | A64F9319ACC51FFFD0491C74DCD9C9084C2783B82F95727E4BFE387A8528C6DCF68F11418E88F1E133D115DAF907549C86DD7AD866B2A7938ADD5225FBB2811D |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 250 |
Entropy (8bit): | 4.865356627324657 |
Encrypted: | false |
SSDEEP: | 6:rgnMXd1CQnMXd1COm8hnaHNHIXUnMXd1CoD9c1uOw1H1gOvOBAn:rgamIHIXUaXe1uOeVqy |
MD5: | EAF8D967454C3BBDDBF2E05A421411F8 |
SHA1: | 6170880409B24DE75C2DC3D56A506FBFF7F6622C |
SHA-256: | F35F2658455A2E40F151549A7D6465A836C33FA9109E67623916F889849EAC56 |
SHA-512: | FE5BE5C673E99F70C93019D01ABB0A29DD2ECF25B2D895190FF551F020C28E7D8F99F65007F440F0F76C5BCAC343B2A179A94D190C938EA3B9E1197890A412E9 |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9 |
Entropy (8bit): | 3.169925001442312 |
Encrypted: | false |
SSDEEP: | 3:QQJyn:Qgyn |
MD5: | A4FB8B71D0FC27C4B4D69F77A7353AB8 |
SHA1: | 4BD36DA388173699C10F388DBA106FC86AC513B7 |
SHA-256: | E918EDFC622A52B0BBFA8754F95DF6F469105C66E8058C4C412D18CEC6EA5E54 |
SHA-512: | 274C1D9BE15632FC3A80A7B64A9A9CCD9CF744FECC3A05B8E121748E8F3E73190338685A09C9ADBC8F2B0A6A1322885C325494208EC8CA322A0E81ECB56C3C96 |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53 |
Entropy (8bit): | 4.263285494083192 |
Encrypted: | false |
SSDEEP: | 3:LjT9fnMXdemzCK0vn:rZnMXd1CV |
MD5: | 8ADA51400B7915DE2124BAAF75E3414C |
SHA1: | 1A7B9DB12184AB7FD7FCE1C383F9670A00ADB081 |
SHA-256: | 45AA3957C29865260A78F03EEF18AE9AEBDBF7BEA751ECC88BE4A799F2BB46C7 |
SHA-512: | 9AFC138157A4565294CA49942579CDB6F5D8084E56F9354738DE62B585F4C0FA3E7F2CBC9541827F2084E3FF36C46EED29B46F5DD2444062FFCD05C599992E68 |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 128000 |
Entropy (8bit): | 7.9781891482236285 |
Encrypted: | false |
SSDEEP: | 3072:NQr/mIsIhGMs6z4PU68TXvdIbmYKNEl+bR0RDz/Nur0S:2Pu8TXVIipNEl+yRDz16J |
MD5: | F82884CC5E7CF22E9702ADBFC1F12BEE |
SHA1: | 5E8D547DFFE7611C737189CE22BB1A8393953E5D |
SHA-256: | BE474ECE5C1A58BD3C86F1CE8E7FAB9049AEADBCA5E4690E00D0751153F55F72 |
SHA-512: | 4BFA17059270DC17A0A9519EC989675116E869CDB6A1B68009C9E737E17DD2CC99CEA17CC2DB4798B25F3F888B2207F8B5F5360FDF847AE2850B79AFF781244E |
Malicious: | false |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1195008 |
Entropy (8bit): | 6.86203096819729 |
Encrypted: | false |
SSDEEP: | 12288:ya88qKSZvx8Lj1uE/FW/OolPkFZkmy08EsuIyOonA6hqsn4YPqyBO/JPcjSTdP3D:yaNEiX1uC7oDA9xXAJmPTY/Jke |
MD5: | A003B564BD23880F99A29006E780A89B |
SHA1: | 8465374554A0C6C02F7914C1278AFD79E96ED8C4 |
SHA-256: | 5BC09C3C2A751169A32CF97A62765F127BCE2D0EADCE3481A6A831B6FDCC044E |
SHA-512: | 0727CF12C3DD9553AFA28CDD3DE5C6970EC4F18F2CB77D437D26AEE71B8C79178209ADB3429151271EC37EE04E37C64E7FBB8C061BBF1C78F59601AEFCF3431B |
Malicious: | true |
Joe Sandbox View: | |
Preview: |
|
Process: | C:\Users\user\Desktop\hTu8FeYy28.exe |
File Type: | |
Category: | modified |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.86203096819729 |
TrID: |
|
File name: | hTu8FeYy28.exe |
File size: | 1195008 |
MD5: | a003b564bd23880f99a29006e780a89b |
SHA1: | 8465374554a0c6c02f7914c1278afd79e96ed8c4 |
SHA256: | 5bc09c3c2a751169a32cf97a62765f127bce2d0eadce3481a6a831b6fdcc044e |
SHA512: | 0727cf12c3dd9553afa28cdd3de5c6970ec4f18f2cb77d437d26aee71b8c79178209adb3429151271ec37ee04e37c64e7fbb8c061bbf1c78f59601aefcf3431b |
SSDEEP: | 12288:ya88qKSZvx8Lj1uE/FW/OolPkFZkmy08EsuIyOonA6hqsn4YPqyBO/JPcjSTdP3D:yaNEiX1uC7oDA9xXAJmPTY/Jke |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
File Icon |
---|
Icon Hash: | c4c0d4d4d4d4d4d4 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x48ab04 |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | c7742f6c154c117ccc5799912fd8bda5 |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
mov eax, 0048A894h |
call 00007F7CCCD858DDh |
mov eax, dword ptr [0048C534h] |
mov eax, dword ptr [eax] |
call 00007F7CCCDE52E9h |
mov ecx, dword ptr [0048C2C4h] |
mov eax, dword ptr [0048C534h] |
mov eax, dword ptr [eax] |
mov edx, dword ptr [00489924h] |
call 00007F7CCCDE52E9h |
mov eax, dword ptr [0048C534h] |
mov eax, dword ptr [eax] |
call 00007F7CCCDE535Dh |
call 00007F7CCCD8366Ch |
lea eax, dword ptr [eax+00h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8e000 | 0x2576 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x9d000 | 0x8be00 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x93000 | 0x9cd0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x92000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x89b4c | 0x89c00 | False | 0.509742584505 | data | 6.51923560789 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
DATA | 0x8b000 | 0x16f8 | 0x1800 | False | 0.423828125 | data | 4.01362753631 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
BSS | 0x8d000 | 0xda1 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.idata | 0x8e000 | 0x2576 | 0x2600 | False | 0.370065789474 | data | 5.02180680424 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.tls | 0x91000 | 0x10 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rdata | 0x92000 | 0x18 | 0x200 | False | 0.05078125 | data | 0.199107517787 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x93000 | 0x9cd0 | 0x9e00 | False | 0.568581882911 | data | 6.65365883915 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x9d000 | 0x8be00 | 0x8be00 | False | 0.360902242516 | data | 6.29042128065 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
ZRCU | 0x9dbe0 | 0x3da59 | PC bitmap, Windows 3.x format, 500 x 294 x 8 | English | United States |
RT_CURSOR | 0xdb63c | 0x134 | data | ||
RT_CURSOR | 0xdb770 | 0x134 | data | ||
RT_CURSOR | 0xdb8a4 | 0x134 | data | ||
RT_CURSOR | 0xdb9d8 | 0x134 | data | ||
RT_CURSOR | 0xdbb0c | 0x134 | data | ||
RT_CURSOR | 0xdbc40 | 0x134 | data | ||
RT_CURSOR | 0xdbd74 | 0x134 | data | ||
RT_BITMAP | 0xdbea8 | 0x1d0 | data | ||
RT_BITMAP | 0xdc078 | 0x1e4 | data | ||
RT_BITMAP | 0xdc25c | 0x1d0 | data | ||
RT_BITMAP | 0xdc42c | 0x1d0 | data | ||
RT_BITMAP | 0xdc5fc | 0x44c14 | data | English | United States |
RT_BITMAP | 0x121210 | 0x1d0 | data | ||
RT_BITMAP | 0x1213e0 | 0x1d0 | data | ||
RT_BITMAP | 0x1215b0 | 0x1d0 | data | ||
RT_BITMAP | 0x121780 | 0x1d0 | data | ||
RT_BITMAP | 0x121950 | 0x1d0 | data | ||
RT_BITMAP | 0x121b20 | 0x1d0 | data | ||
RT_BITMAP | 0x121cf0 | 0xe8 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x121dd8 | 0x468 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x122240 | 0x10a8 | data | English | United States |
RT_ICON | 0x1232e8 | 0x25a8 | data | English | United States |
RT_DIALOG | 0x125890 | 0x52 | data | ||
RT_STRING | 0x1258e4 | 0x1a0 | data | ||
RT_STRING | 0x125a84 | 0x4e4 | data | ||
RT_STRING | 0x125f68 | 0x1f0 | data | ||
RT_STRING | 0x126158 | 0x1c0 | data | ||
RT_STRING | 0x126318 | 0xdc | data | ||
RT_STRING | 0x1263f4 | 0x488 | data | ||
RT_STRING | 0x12687c | 0xc0 | data | ||
RT_STRING | 0x12693c | 0xfc | data | ||
RT_STRING | 0x126a38 | 0x120 | data | ||
RT_STRING | 0x126b58 | 0x434 | data | ||
RT_STRING | 0x126f8c | 0x3f0 | data | ||
RT_STRING | 0x12737c | 0x3e4 | data | ||
RT_STRING | 0x127760 | 0x410 | data | ||
RT_STRING | 0x127b70 | 0x1b0 | data | ||
RT_STRING | 0x127d20 | 0xec | data | ||
RT_STRING | 0x127e0c | 0x1e4 | data | ||
RT_STRING | 0x127ff0 | 0x3e8 | data | ||
RT_STRING | 0x1283d8 | 0x358 | data | ||
RT_STRING | 0x128730 | 0x2b4 | data | ||
RT_RCDATA | 0x1289e4 | 0x10 | data | ||
RT_RCDATA | 0x1289f4 | 0x320 | data | ||
RT_GROUP_CURSOR | 0x128d14 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d28 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d3c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d50 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d64 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d78 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x128d8c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_ICON | 0x128da0 | 0x30 | data | English | United States |
Imports |
---|
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCreateKeyExA, RegCloseKey, GetUserNameA |
kernel32.dll | lstrcpyA, lstrcmpA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalSize, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetUserDefaultLCID, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, StretchBlt, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionA, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRectRgn, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateEnhMetaFileA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, CloseEnhMetaFile, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgItem, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, ChildWindowFromPoint, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
ole32.dll | CreateStreamOnHGlobal, IsAccelerator, OleDraw, OleSetMenuDescriptor, CoTaskMemAlloc, CoCreateInstance, CoGetClassObject, CoUninitialize, CoInitialize, IsEqualGUID |
oleaut32.dll | GetErrorInfo, SysFreeString |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls |
winspool.drv | OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter |
comdlg32.dll | PrintDlgA, GetSaveFileNameA, GetOpenFileNameA |
uRL | InetIsOffline |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 8, 2021 17:51:50.746925116 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:50.746973991 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:50.747046947 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:50.756189108 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:50.756227016 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:50.805953026 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:50.806113005 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.097635984 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.097661972 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.098063946 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.098184109 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.102875948 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.135827065 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.135921001 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.135935068 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.135977983 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.135982037 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.135993958 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136030912 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136039019 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136071920 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136081934 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136086941 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136120081 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136125088 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136132002 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136161089 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136182070 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136827946 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136897087 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136904955 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136936903 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136945009 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.136950016 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.136996984 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138175011 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138252020 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138501883 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138566971 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138581038 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138622999 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138633013 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138638973 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138667107 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138704062 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138926029 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.138987064 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.138997078 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139046907 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139326096 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139391899 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139615059 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139691114 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139700890 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139744997 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139764071 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139770985 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139801979 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139805079 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139841080 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.139847040 CEST | 443 | 49821 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.139888048 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.142812967 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.142841101 CEST | 49821 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.146361113 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.146424055 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.146567106 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.147566080 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.147619963 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.187130928 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.187303066 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.188441038 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.195431948 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.195529938 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240665913 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240780115 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240827084 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240829945 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.240866899 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240868092 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.240880966 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240933895 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.240940094 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240953922 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.240992069 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.241023064 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243573904 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243659973 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243668079 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243685007 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243716002 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243746996 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243762016 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243777990 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243810892 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243839979 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243844032 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243854046 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243885994 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243913889 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243925095 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243937016 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.243966103 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.243974924 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244009018 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244016886 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244028091 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244049072 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244091988 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244102955 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244151115 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244441032 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244515896 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244520903 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244537115 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244570017 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244613886 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.244622946 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.244673967 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.245106936 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.245187998 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.245189905 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.245206118 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.245240927 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.245287895 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.246073961 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.246140003 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.246187925 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.246212959 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.246223927 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.246267080 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256637096 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256728888 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256767035 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256803989 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256818056 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256840944 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256855965 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256890059 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256891012 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256910086 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256923914 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.256952047 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256992102 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.256999969 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.257046938 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.257733107 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.257838011 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.257860899 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.257937908 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.257951021 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.257968903 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.258012056 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.258064032 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.259557009 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.259609938 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.259677887 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.259702921 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.259716988 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.259784937 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.259979963 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.260067940 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.260859013 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.260966063 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.261760950 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.261811018 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.261856079 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.261876106 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.261948109 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.262527943 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.262607098 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.262689114 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.263470888 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.263547897 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.264344931 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.264434099 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.265244961 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.265297890 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.265379906 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.265398979 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.265454054 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.272552013 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.272733927 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.273868084 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.273955107 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.274009943 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.274039984 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.274054050 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.274097919 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.275522947 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.275579929 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.275609970 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.275634050 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.275655985 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.275679111 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.275907993 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.275963068 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.276004076 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.276024103 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.276046991 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.276079893 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.276886940 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.276979923 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
Oct 8, 2021 17:51:51.277112961 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.277214050 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.334764004 CEST | 49822 | 443 | 192.168.2.3 | 162.159.130.233 |
Oct 8, 2021 17:51:51.334803104 CEST | 443 | 49822 | 162.159.130.233 | 192.168.2.3 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 8, 2021 17:51:50.713258028 CEST | 53777 | 53 | 192.168.2.3 | 8.8.8.8 |
Oct 8, 2021 17:51:50.733095884 CEST | 53 | 53777 | 8.8.8.8 | 192.168.2.3 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Oct 8, 2021 17:51:50.713258028 CEST | 192.168.2.3 | 8.8.8.8 | 0xa2a4 | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Oct 8, 2021 17:51:50.733095884 CEST | 8.8.8.8 | 192.168.2.3 | 0xa2a4 | No error (0) | 162.159.130.233 | A (IP address) | IN (0x0001) | ||
Oct 8, 2021 17:51:50.733095884 CEST | 8.8.8.8 | 192.168.2.3 | 0xa2a4 | No error (0) | 162.159.133.233 | A (IP address) | IN (0x0001) | ||
Oct 8, 2021 17:51:50.733095884 CEST | 8.8.8.8 | 192.168.2.3 | 0xa2a4 | No error (0) | 162.159.134.233 | A (IP address) | IN (0x0001) | ||
Oct 8, 2021 17:51:50.733095884 CEST | 8.8.8.8 | 192.168.2.3 | 0xa2a4 | No error (0) | 162.159.135.233 | A (IP address) | IN (0x0001) | ||
Oct 8, 2021 17:51:50.733095884 CEST | 8.8.8.8 | 192.168.2.3 | 0xa2a4 | No error (0) | 162.159.129.233 | A (IP address) | IN (0x0001) |
HTTP Request Dependency Graph |
---|
|
HTTPS Proxied Packets |
---|
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
0 | 192.168.2.3 | 49821 | 162.159.130.233 | 443 | C:\Users\user\Desktop\hTu8FeYy28.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-10-08 15:51:51 UTC | 0 | OUT | |
2021-10-08 15:51:51 UTC | 0 | IN | |
2021-10-08 15:51:51 UTC | 1 | IN | |
2021-10-08 15:51:51 UTC | 1 | IN | |
2021-10-08 15:51:51 UTC | 2 | IN | |
2021-10-08 15:51:51 UTC | 4 | IN | |
2021-10-08 15:51:51 UTC | 5 | IN | |
2021-10-08 15:51:51 UTC | 6 | IN | |
2021-10-08 15:51:51 UTC | 8 | IN | |
2021-10-08 15:51:51 UTC | 9 | IN | |
2021-10-08 15:51:51 UTC | 10 | IN | |
2021-10-08 15:51:51 UTC | 12 | IN | |
2021-10-08 15:51:51 UTC | 13 | IN | |
2021-10-08 15:51:51 UTC | 14 | IN | |
2021-10-08 15:51:51 UTC | 16 | IN | |
2021-10-08 15:51:51 UTC | 17 | IN | |
2021-10-08 15:51:51 UTC | 18 | IN | |
2021-10-08 15:51:51 UTC | 20 | IN | |
2021-10-08 15:51:51 UTC | 21 | IN | |
2021-10-08 15:51:51 UTC | 22 | IN | |
2021-10-08 15:51:51 UTC | 24 | IN | |
2021-10-08 15:51:51 UTC | 25 | IN | |
2021-10-08 15:51:51 UTC | 26 | IN | |
2021-10-08 15:51:51 UTC | 28 | IN | |
2021-10-08 15:51:51 UTC | 29 | IN | |
2021-10-08 15:51:51 UTC | 30 | IN | |
2021-10-08 15:51:51 UTC | 32 | IN | |
2021-10-08 15:51:51 UTC | 33 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | Process |
---|---|---|---|---|---|
1 | 192.168.2.3 | 49822 | 162.159.130.233 | 443 | C:\Users\user\Desktop\hTu8FeYy28.exe |
Timestamp | kBytes transferred | Direction | Data |
---|---|---|---|
2021-10-08 15:51:51 UTC | 34 | OUT | |
2021-10-08 15:51:51 UTC | 35 | IN | |
2021-10-08 15:51:51 UTC | 36 | IN | |
2021-10-08 15:51:51 UTC | 36 | IN | |
2021-10-08 15:51:51 UTC | 37 | IN | |
2021-10-08 15:51:51 UTC | 39 | IN | |
2021-10-08 15:51:51 UTC | 40 | IN | |
2021-10-08 15:51:51 UTC | 41 | IN | |
2021-10-08 15:51:51 UTC | 43 | IN | |
2021-10-08 15:51:51 UTC | 44 | IN | |
2021-10-08 15:51:51 UTC | 45 | IN | |
2021-10-08 15:51:51 UTC | 47 | IN | |
2021-10-08 15:51:51 UTC | 48 | IN | |
2021-10-08 15:51:51 UTC | 49 | IN | |
2021-10-08 15:51:51 UTC | 51 | IN | |
2021-10-08 15:51:51 UTC | 52 | IN | |
2021-10-08 15:51:51 UTC | 53 | IN | |
2021-10-08 15:51:51 UTC | 55 | IN | |
2021-10-08 15:51:51 UTC | 56 | IN | |
2021-10-08 15:51:51 UTC | 57 | IN | |
2021-10-08 15:51:51 UTC | 59 | IN | |
2021-10-08 15:51:51 UTC | 59 | IN | |
2021-10-08 15:51:51 UTC | 60 | IN | |
2021-10-08 15:51:51 UTC | 61 | IN | |
2021-10-08 15:51:51 UTC | 63 | IN | |
2021-10-08 15:51:51 UTC | 64 | IN | |
2021-10-08 15:51:51 UTC | 65 | IN | |
2021-10-08 15:51:51 UTC | 67 | IN | |
2021-10-08 15:51:51 UTC | 68 | IN | |
2021-10-08 15:51:51 UTC | 69 | IN | |
2021-10-08 15:51:51 UTC | 71 | IN | |
2021-10-08 15:51:51 UTC | 72 | IN | |
2021-10-08 15:51:51 UTC | 73 | IN | |
2021-10-08 15:51:51 UTC | 75 | IN | |
2021-10-08 15:51:51 UTC | 76 | IN | |
2021-10-08 15:51:51 UTC | 77 | IN | |
2021-10-08 15:51:51 UTC | 79 | IN | |
2021-10-08 15:51:51 UTC | 80 | IN | |
2021-10-08 15:51:51 UTC | 81 | IN | |
2021-10-08 15:51:51 UTC | 83 | IN | |
2021-10-08 15:51:51 UTC | 84 | IN | |
2021-10-08 15:51:51 UTC | 86 | IN | |
2021-10-08 15:51:51 UTC | 87 | IN | |
2021-10-08 15:51:51 UTC | 88 | IN | |
2021-10-08 15:51:51 UTC | 91 | IN | |
2021-10-08 15:51:51 UTC | 95 | IN | |
2021-10-08 15:51:51 UTC | 98 | IN | |
2021-10-08 15:51:51 UTC | 102 | IN | |
2021-10-08 15:51:51 UTC | 106 | IN | |
2021-10-08 15:51:51 UTC | 110 | IN | |
2021-10-08 15:51:51 UTC | 114 | IN | |
2021-10-08 15:51:51 UTC | 118 | IN | |
2021-10-08 15:51:51 UTC | 122 | IN | |
2021-10-08 15:51:51 UTC | 127 | IN | |
2021-10-08 15:51:51 UTC | 131 | IN | |
2021-10-08 15:51:51 UTC | 134 | IN | |
2021-10-08 15:51:51 UTC | 138 | IN | |
2021-10-08 15:51:51 UTC | 142 | IN | |
2021-10-08 15:51:51 UTC | 146 | IN | |
2021-10-08 15:51:51 UTC | 150 | IN | |
2021-10-08 15:51:51 UTC | 154 | IN | |
2021-10-08 15:51:51 UTC | 158 | IN |
Code Manipulations |
---|
Statistics |
---|
CPU Usage |
---|
Click to jump to process
Memory Usage |
---|
Click to jump to process
High Level Behavior Distribution |
---|
back
Click to dive into process behavior distribution
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 17:50:03 |
Start date: | 08/10/2021 |
Path: | C:\Users\user\Desktop\hTu8FeYy28.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1195008 bytes |
MD5 hash: | A003B564BD23880F99A29006E780A89B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
General |
---|
Start time: | 17:51:50 |
Start date: | 08/10/2021 |
Path: | C:\Users\user\Desktop\hTu8FeYy28.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1195008 bytes |
MD5 hash: | A003B564BD23880F99A29006E780A89B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
General |
---|
Start time: | 17:51:51 |
Start date: | 08/10/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd80000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:51 |
Start date: | 08/10/2021 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1230000 |
File size: | 185856 bytes |
MD5 hash: | 15FF7D8324231381BAD48A052F85DF04 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:51 |
Start date: | 08/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:52 |
Start date: | 08/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:52 |
Start date: | 08/10/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd80000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:52 |
Start date: | 08/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:53 |
Start date: | 08/10/2021 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd80000 |
File size: | 232960 bytes |
MD5 hash: | F3BDBE3BB6F734E357235F4D5898582D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 17:51:53 |
Start date: | 08/10/2021 |
Path: | C:\Users\user\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1195008 bytes |
MD5 hash: | A003B564BD23880F99A29006E780A89B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
General |
---|
Start time: | 17:51:53 |
Start date: | 08/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 17:51:53 |
Start date: | 08/10/2021 |
Path: | C:\Windows\SysWOW64\reg.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xee0000 |
File size: | 59392 bytes |
MD5 hash: | CEE2A7E57DF2A159A065A34913A055C2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
General |
---|
Start time: | 17:51:54 |
Start date: | 08/10/2021 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f20f0000 |
File size: | 625664 bytes |
MD5 hash: | EA777DEEA782E8B4D7C7C33BBF8A4496 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Disassembly |
---|
Code Analysis |
---|
Executed Functions |
---|
Function 00401000, Relevance: 131.4, APIs: 37, Strings: 38, Instructions: 159libraryloaderCOMMON
C-Code - Quality: 93% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401272, Relevance: 21.1, APIs: 9, Strings: 3, Instructions: 58fileCOMMON
C-Code - Quality: 88% |
|
APIs |
|
Strings |
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401000, Relevance: 73.7, APIs: 4, Strings: 38, Instructions: 159libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040202B, Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 119stringmemorysleepCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401339, Relevance: 22.8, APIs: 9, Strings: 4, Instructions: 82processmemorysynchronizationCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Strings |
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401339, Relevance: 14.1, APIs: 4, Strings: 4, Instructions: 82processsynchronizationCOMMON
C-Code - Quality: 55% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401272, Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 58fileCOMMON
C-Code - Quality: 43% |
|
APIs |
Strings |
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0040202B, Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 119sleepsynchronizationCOMMON
C-Code - Quality: 40% |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Non-executed Functions |
---|
Function 00401F8B, Relevance: 13.5, APIs: 9, Instructions: 36clipboardmemoryCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401542, Relevance: 9.1, APIs: 6, Instructions: 68stringCOMMON
C-Code - Quality: 100% |
|
APIs |
|
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00401684, Relevance: 7.6, APIs: 5, Instructions: 87stringCOMMON
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 004015E9, Relevance: 7.6, APIs: 5, Instructions: 64stringCOMMON
C-Code - Quality: 100% |
|
APIs |
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00402230, Relevance: 7.6, APIs: 4, Strings: 1, Instructions: 51stringmemoryCOMMON
C-Code - Quality: 87% |
|
APIs |
Strings |
|
Memory Dump Source |
|
Yara matches |
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |