Windows
Analysis Report
6GUgc6JYS1.exe
Overview
General Information
Sample name: | 6GUgc6JYS1.exerenamed because original name is a hash value |
Original sample name: | cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8.exe |
Analysis ID: | 1542745 |
MD5: | 789bf0a8714e77d0d524ba22d8efbd7e |
SHA1: | 61c56b19c55020494fa19faa3d1b7a2f070259df |
SHA256: | cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8 |
Tags: | 20-25-126-96exeuser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 6GUgc6JYS1.exe (PID: 6608 cmdline:
"C:\Users\ user\Deskt op\6GUgc6J YS1.exe" MD5: 789BF0A8714E77D0D524BA22D8EFBD7E) - WerFault.exe (PID: 7088 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 6 608 -s 122 8 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Cobalt Strike, CobaltStrike | Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable. |
{"C2Server": "http://20.25.126.96:443/bDDs", "User Agent": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n"}
{"Headers": "User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET CLR 2.0.50727)\r\n", "Type": "Metasploit Download", "URL": "http://20.25.126.96/bDDs"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Metasploit_7bc0f998 | Identifies the API address lookup function leverage by metasploit shellcode | unknown |
| |
Windows_Trojan_Metasploit_c9773203 | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_MetasploitPayload_3 | Yara detected Metasploit Payload | Joe Security | ||
JoeSecurity_CobaltStrike_3 | Yara detected CobaltStrike | Joe Security | ||
Windows_Trojan_Metasploit_7bc0f998 | Identifies the API address lookup function leverage by metasploit shellcode | unknown |
| |
Windows_Trojan_Metasploit_c9773203 | Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. | unknown |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T09:11:36.563533+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49710 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:38.792427+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49713 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:40.928461+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49716 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:43.046909+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49719 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:45.159166+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49722 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:47.312952+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49725 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:49.412285+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49728 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:51.549927+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49732 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:53.653075+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49740 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:55.932749+0200 | 2028765 | 3 | Unknown Traffic | 192.168.2.12 | 49744 | 20.25.126.96 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00007FF78FD22C20 |
Networking |
---|
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 1_2_00007FF78FD219FB | |
Source: | Code function: | 1_2_00007FF78FD21485 | |
Source: | Code function: | 1_2_00007FF78FD21A47 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_000002598BC101C4 | |
Source: | Code function: | 1_2_000002598BC10387 | |
Source: | Code function: | 1_2_000002598BC10387 |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 1_2_00007FF78FD21180 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtMapViewOfSection: | Jump to behavior | ||
Source: | NtCreateThreadEx: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 11 Security Software Discovery | Remote Services | Data from Local System | 2 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 1 Abuse Elevation Control Mechanism | LSASS Memory | 1 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 11 Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 1 DLL Side-Loading | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Steganography | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
53% | ReversingLabs | Win64.Trojan.CobaltStrike |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
20.25.126.96 | unknown | United States | 8075 | MICROSOFT-CORP-MSN-AS-BLOCKUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542745 |
Start date and time: | 2024-10-26 09:10:18 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 34s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 6GUgc6JYS1.exerenamed because original name is a hash value |
Original Sample Name: | cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8.exe |
Detection: | MAL |
Classification: | mal92.troj.evad.winEXE@2/5@0/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: 6GUgc6JYS1.exe
Time | Type | Description |
---|---|---|
03:12:01 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
20.25.126.96 | Get hash | malicious | CobaltStrike, Metasploit | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
MICROSOFT-CORP-MSN-AS-BLOCKUS | Get hash | malicious | CobaltStrike, Metasploit | Browse |
| |
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_6GUgc6JYS1.exe_14b8f6c7377787902fbdfdce8cfba71edc84f2_d9c5afb0_0b286928-5b74-4105-9195-d990964fe4a3\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8902174182806722 |
Encrypted: | false |
SSDEEP: | 96:iLFQfuv3+/sa2Coh7JfTQXIDcQWc6zcEZcw37n+HbHg/5jgOg0dl/phsv5o1OyWW:MLvu/v0I3DEjZ7yzuiFCZ24lO8Te |
MD5: | 7E020017FA17FA6F8252756296A3FE3B |
SHA1: | 8A5131A2820BCAA053C4DBF87E16CF77CDBD4F5E |
SHA-256: | 115ECCEC8F395FDEC41C5D04EF94666935B31CC36468A519DF492746169029FF |
SHA-512: | 21F3E4E21EAAA07C2425CB59E989D5C279BC516D2CE2BC71894727A1AF9513696192C19E8968A99345AAE23B685F93AF0C9C10EE130140D7690D39E3074FBEF6 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 159734 |
Entropy (8bit): | 1.3021244577485591 |
Encrypted: | false |
SSDEEP: | 384:nyCEX5vNwAOK3DR/62N5t3akw74uM1KjE5qdQt58:nL85FwAOcVSG5t3akw74VL5QQw |
MD5: | C0AC191691F22EC7492F8AD8B057D770 |
SHA1: | 93E287CFDD352E094CED28B76D04456F6111ECA5 |
SHA-256: | C1A12A4F64F2BBAFE6D45871DFAF5C8B13CBCAC8D28234C5285AECACB932873D |
SHA-512: | BDE0DF232B2A7D0EC2381B47CD5FCB6DE791AF485A1B555CD426D38A27C320FF743FE2CD5F0DE219A1DA636E0601DCDDC0CCCB47C77ADE8CE40E4114C2016439 |
Malicious: | false |
Yara Hits: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8812 |
Entropy (8bit): | 3.7110211166131153 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJOHEP6Y+izpgmfWYoJpDa89b3ddfadm:R6lXJuE6YbzpgmfWYof3nfJ |
MD5: | 28E3487898A8A9F6333A7027C90429D4 |
SHA1: | 2982EDF69F8DD684D51AEB01E281452528A09DE8 |
SHA-256: | 469D29D5DA9682EF0095AB303836CFCE7ECBD79B87AC3E154037E27EB7BB454D |
SHA-512: | 23DB188CBFFC64DA234A5176955752A23BB801078D7AD1A83F96F93ABBED04907D32A6E63384F3AF2B4AB3DEFA0E7F16FE3496A2851AD990D01FF28956874E33 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4701 |
Entropy (8bit): | 4.505379579987411 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsI/Jg771I9N/OWpW8VYJYm8M4JOlFOKFAyq85j+QONKi/LE4gzTfd:uIjfSI7yv7VFJOvEyDOfzErTfd |
MD5: | 602D680BABEC94E2A1A7CA542049B7E6 |
SHA1: | 88B4AF2E6A1C22EA9EE9C649B6B93092A8079367 |
SHA-256: | 0B29A01BE9BA79774B54DBD2B26B7818B3341683FB2B43DFA801FEA87911D3ED |
SHA-512: | 4C844227400D5DCFB43405D0C9EE08E2D09F790ED99C07C54FAAEE33EA6B300797568A54D49DF8EC6E68428AC01733297216096E8F576E8E62E2D5455A932A51 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.569187439173982 |
Encrypted: | false |
SSDEEP: | 6144:ooPefZnQMa3tfLXbn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGAGBsLq:lPPAooVJHnsg/d1TsqGn |
MD5: | 36260AE22F8B73E4B96085F9356E8DE8 |
SHA1: | B2C9C092DA18315AE9117B0EEBB74C3713D8D0FD |
SHA-256: | 9BA9EEA9C99AF22C809FF8354BB68806657F9ADDD8A94D8A4C050218D10F3012 |
SHA-512: | E3A71076684C4D0022A9B9A5FE6C21C4D81649587FB25FAAAB5857619D079A57D54D2D7E1AEA2D2AD621C77F66D23820A4E541EC344B9114FA73F663706DCBC0 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.361963209685598 |
TrID: |
|
File name: | 6GUgc6JYS1.exe |
File size: | 23'040 bytes |
MD5: | 789bf0a8714e77d0d524ba22d8efbd7e |
SHA1: | 61c56b19c55020494fa19faa3d1b7a2f070259df |
SHA256: | cf580830ecedcd498730091d01b92c1fde220d95f1fa677ce88f1a17f236b6b8 |
SHA512: | 70cfde0ebc2dec25bf28873269543351cc8a218e6a0d5d7b6f3d3c87673aa81ad0187ed6990ed82875455b621ec49a02f875760c6bf6c7359971658d05af933b |
SSDEEP: | 384:Y021unhcOSuFUKrxzk+kzekzLko0nN7WIeW:Yt0GOHF5lk+kKkzLz0nJ |
TLSH: | E7A2084FFB9258ECC21ED03985EA9B31AD71B86044905B2FE778ED711F20961AF39352 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............+.,...V...".............@..........................................`... ............................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x1400013d0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x6718BD08 [Wed Oct 23 09:08:24 2024 UTC] |
TLS Callbacks: | 0x40002890, 0x1, 0x40002860, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | a3f3b74a6140351f8e7200ddf88e2e48 |
Instruction |
---|
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00004015h] |
mov dword ptr [eax], 00000001h |
call 00007FD86C7D8C4Fh |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop dword ptr [eax] |
dec eax |
sub esp, 28h |
dec eax |
mov eax, dword ptr [00003FF5h] |
mov dword ptr [eax], 00000000h |
call 00007FD86C7D8C2Fh |
nop |
nop |
dec eax |
add esp, 28h |
ret |
nop dword ptr [eax] |
dec eax |
sub esp, 28h |
call 00007FD86C7DB3ACh |
dec eax |
cmp eax, 01h |
sbb eax, eax |
dec eax |
add esp, 28h |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
dec eax |
lea ecx, dword ptr [00000009h] |
jmp 00007FD86C7D8E89h |
nop dword ptr [eax+00h] |
ret |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
nop |
dec eax |
jmp ecx |
dec eax |
arpl word ptr [00002BB6h], ax |
test eax, eax |
jle 00007FD86C7D8ED8h |
cmp dword ptr [00002BAFh], 00000000h |
jle 00007FD86C7D8ECFh |
dec eax |
mov edx, dword ptr [00009D8Ah] |
dec eax |
mov dword ptr [ecx+eax], edx |
dec eax |
mov edx, dword ptr [00009D87h] |
dec eax |
arpl word ptr [00002B94h], ax |
dec eax |
mov dword ptr [ecx+eax], edx |
ret |
push ebp |
push edi |
push esi |
push ebx |
dec eax |
sub esp, 00000088h |
dec eax |
arpl dx, ax |
dec eax |
mov edi, ecx |
xor ecx, ecx |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb000 | 0x6e4 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xe000 | 0x3e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x6000 | 0x3fc | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xf000 | 0x7c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x5040 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb1d0 | 0x190 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2aa8 | 0x2c00 | 88650f3b39c64c8fc929476a25b66439 | False | 0.5095880681818182 | data | 6.038952498895535 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x4000 | 0x4b0 | 0x600 | 22b93c3335383d8ae590e670f7bd6e68 | False | 0.6725260416666666 | data | 5.983486071991815 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x5000 | 0x950 | 0xa00 | 3549a44efb7dacab789f7957db19e9bf | False | 0.23046875 | data | 3.974332583159687 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.pdata | 0x6000 | 0x3fc | 0x400 | af3a5fc9405581543e9fe642c8b3cfe4 | False | 0.50390625 | data | 4.1070762649908765 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.xdata | 0x7000 | 0x2c4 | 0x400 | f9f84d96f7d46b6459820b4f8305922d | False | 0.2861328125 | data | 2.896667181484537 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x8000 | 0x2120 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0xb000 | 0x6e4 | 0x800 | 40bc1346723ef460d9e793bf7985fe91 | False | 0.3212890625 | data | 3.5144818216706186 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0xc000 | 0x60 | 0x200 | 5ef26311a99fa82b8c36b2288f406e7d | False | 0.068359375 | data | 0.28655982431271465 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0xd000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xe000 | 0x3e8 | 0x400 | 5d241ef7651954dadb8e43a444c74261 | False | 0.4482421875 | data | 3.325221446899578 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xf000 | 0x7c | 0x200 | e9430c9e167f4b5795a489747c577ff7 | False | 0.2421875 | data | 1.4308862585029796 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xe058 | 0x38c | PGP symmetric key encrypted data - Plaintext or unencrypted data | English | United States | 0.46365638766519823 |
DLL | Import |
---|---|
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, GetCurrentProcess, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetProcAddress, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery, WaitForSingleObject |
msvcrt.dll | __C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, abort, calloc, exit, fclose, fopen, fprintf, fread, free, fsetpos, fwrite, malloc, mbstowcs, memcmp, memcpy, rand, signal, strlen, strncmp, vfprintf, wcsncat, wcsncpy |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T09:11:36.563533+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49710 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:38.792427+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49713 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:40.928461+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49716 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:43.046909+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49719 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:45.159166+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49722 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:47.312952+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49725 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:49.412285+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49728 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:51.549927+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49732 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:53.653075+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49740 | 20.25.126.96 | 443 | TCP |
2024-10-26T09:11:55.932749+0200 | 2028765 | ET JA3 Hash - [Abuse.ch] Possible Dridex | 3 | 192.168.2.12 | 49744 | 20.25.126.96 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 26, 2024 09:11:35.497083902 CEST | 49710 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:35.497133017 CEST | 443 | 49710 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:35.497252941 CEST | 49710 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:35.507602930 CEST | 49710 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:35.507632971 CEST | 443 | 49710 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:36.563286066 CEST | 443 | 49710 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:36.563533068 CEST | 49710 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:36.594609022 CEST | 49710 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:36.594636917 CEST | 443 | 49710 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:36.655646086 CEST | 49711 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:36.655700922 CEST | 443 | 49711 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:36.655776024 CEST | 49711 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:36.656140089 CEST | 49711 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:36.656155109 CEST | 443 | 49711 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.734308004 CEST | 443 | 49711 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.734417915 CEST | 49711 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.734534979 CEST | 49711 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.734555006 CEST | 443 | 49711 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.735335112 CEST | 49712 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.735435963 CEST | 443 | 49712 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.735536098 CEST | 49712 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.735646009 CEST | 49712 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.735692024 CEST | 443 | 49712 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.735747099 CEST | 49712 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.736633062 CEST | 49713 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.736676931 CEST | 443 | 49713 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:37.736740112 CEST | 49713 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.737027884 CEST | 49713 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:37.737044096 CEST | 443 | 49713 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:38.792326927 CEST | 443 | 49713 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:38.792427063 CEST | 49713 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:38.792519093 CEST | 49713 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:38.792538881 CEST | 443 | 49713 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:38.793190002 CEST | 49714 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:38.793253899 CEST | 443 | 49714 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:38.793339014 CEST | 49714 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:38.793833017 CEST | 49714 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:38.793862104 CEST | 443 | 49714 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.854671955 CEST | 443 | 49714 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.854752064 CEST | 49714 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.854854107 CEST | 49714 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.854877949 CEST | 443 | 49714 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.855705023 CEST | 49715 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.855742931 CEST | 443 | 49715 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.855827093 CEST | 49715 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.855952024 CEST | 49715 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.855988979 CEST | 443 | 49715 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.856055021 CEST | 49715 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.856913090 CEST | 49716 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.856961012 CEST | 443 | 49716 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:39.857018948 CEST | 49716 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.857420921 CEST | 49716 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:39.857438087 CEST | 443 | 49716 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:40.928323030 CEST | 443 | 49716 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:40.928461075 CEST | 49716 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:40.928617954 CEST | 49716 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:40.928632975 CEST | 443 | 49716 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:40.929383039 CEST | 49717 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:40.929425955 CEST | 443 | 49717 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:40.929507017 CEST | 49717 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:40.929742098 CEST | 49717 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:40.929757118 CEST | 443 | 49717 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.991852045 CEST | 443 | 49717 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.991959095 CEST | 49717 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.992046118 CEST | 49717 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.992065907 CEST | 443 | 49717 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.992644072 CEST | 49718 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.992691994 CEST | 443 | 49718 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.992748022 CEST | 49718 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.992820978 CEST | 49718 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.992889881 CEST | 443 | 49718 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.992938995 CEST | 49718 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.997992992 CEST | 49719 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.998011112 CEST | 443 | 49719 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:41.998070002 CEST | 49719 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.999449015 CEST | 49719 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:41.999465942 CEST | 443 | 49719 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:43.046785116 CEST | 443 | 49719 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:43.046909094 CEST | 49719 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:43.047147036 CEST | 49719 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:43.047166109 CEST | 443 | 49719 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:43.051527977 CEST | 49720 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:43.051567078 CEST | 443 | 49720 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:43.051639080 CEST | 49720 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:43.052032948 CEST | 49720 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:43.052047968 CEST | 443 | 49720 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.101308107 CEST | 443 | 49720 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.101404905 CEST | 49720 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.104733944 CEST | 49720 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.104770899 CEST | 443 | 49720 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.106872082 CEST | 49721 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.106909990 CEST | 443 | 49721 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.106972933 CEST | 49721 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.107078075 CEST | 49721 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.107129097 CEST | 443 | 49721 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.107182026 CEST | 49721 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.108058929 CEST | 49722 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.108088970 CEST | 443 | 49722 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:44.108151913 CEST | 49722 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.108406067 CEST | 49722 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:44.108419895 CEST | 443 | 49722 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:45.158934116 CEST | 443 | 49722 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:45.159166098 CEST | 49722 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:45.182763100 CEST | 49722 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:45.182796001 CEST | 443 | 49722 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:45.211158037 CEST | 49723 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:45.211193085 CEST | 443 | 49723 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:45.211338043 CEST | 49723 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:45.211730957 CEST | 49723 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:45.211746931 CEST | 443 | 49723 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.269875050 CEST | 443 | 49723 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.270025015 CEST | 49723 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.270090103 CEST | 49723 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.270116091 CEST | 443 | 49723 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.272933960 CEST | 49724 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.272993088 CEST | 443 | 49724 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.273072958 CEST | 49724 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.273168087 CEST | 49724 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.273240089 CEST | 443 | 49724 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.273294926 CEST | 49724 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.274260044 CEST | 49725 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.274296999 CEST | 443 | 49725 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:46.274360895 CEST | 49725 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.274652004 CEST | 49725 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:46.274667978 CEST | 443 | 49725 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:47.312789917 CEST | 443 | 49725 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:47.312952042 CEST | 49725 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:47.313077927 CEST | 49725 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:47.313095093 CEST | 443 | 49725 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:47.314095020 CEST | 49726 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:47.314160109 CEST | 443 | 49726 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:47.314248085 CEST | 49726 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:47.314583063 CEST | 49726 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:47.314599991 CEST | 443 | 49726 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.350248098 CEST | 443 | 49726 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.350409031 CEST | 49726 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.350702047 CEST | 49726 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.350730896 CEST | 443 | 49726 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.352202892 CEST | 49727 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.352242947 CEST | 443 | 49727 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.352375984 CEST | 49727 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.352601051 CEST | 49727 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.352636099 CEST | 443 | 49727 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.352722883 CEST | 49727 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.360393047 CEST | 49728 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.360411882 CEST | 443 | 49728 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:48.360546112 CEST | 49728 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.361232996 CEST | 49728 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:48.361244917 CEST | 443 | 49728 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:49.412168026 CEST | 443 | 49728 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:49.412285089 CEST | 49728 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:49.412368059 CEST | 49728 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:49.412389040 CEST | 443 | 49728 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:49.413283110 CEST | 49729 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:49.413341045 CEST | 443 | 49729 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:49.413429976 CEST | 49729 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:49.413737059 CEST | 49729 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:49.413755894 CEST | 443 | 49729 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.484500885 CEST | 443 | 49729 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.484582901 CEST | 49729 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.484668970 CEST | 49729 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.484692097 CEST | 443 | 49729 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.485275030 CEST | 49731 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.485307932 CEST | 443 | 49731 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.485372066 CEST | 49731 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.485428095 CEST | 49731 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.485460043 CEST | 443 | 49731 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.485501051 CEST | 49731 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.486453056 CEST | 49732 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.486483097 CEST | 443 | 49732 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:50.486547947 CEST | 49732 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.486913919 CEST | 49732 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:50.486924887 CEST | 443 | 49732 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:51.549854040 CEST | 443 | 49732 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:51.549926996 CEST | 49732 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:51.550039053 CEST | 49732 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:51.550050020 CEST | 443 | 49732 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:51.551340103 CEST | 49736 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:51.551415920 CEST | 443 | 49736 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:51.551872969 CEST | 49736 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:51.552227020 CEST | 49736 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:51.552252054 CEST | 443 | 49736 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.607800961 CEST | 443 | 49736 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.607954025 CEST | 49736 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.608061075 CEST | 49736 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.608083963 CEST | 443 | 49736 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.608664989 CEST | 49739 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.608716011 CEST | 443 | 49739 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.608798027 CEST | 49739 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.608906984 CEST | 49739 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.608937979 CEST | 443 | 49739 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.608994007 CEST | 49739 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.610008001 CEST | 49740 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.610060930 CEST | 443 | 49740 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:52.610137939 CEST | 49740 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.610428095 CEST | 49740 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:52.610445976 CEST | 443 | 49740 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:53.653008938 CEST | 443 | 49740 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:53.653074980 CEST | 49740 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:53.653165102 CEST | 49740 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:53.653179884 CEST | 443 | 49740 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:53.653816938 CEST | 49742 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:53.653841019 CEST | 443 | 49742 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:53.653995037 CEST | 49742 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:53.654305935 CEST | 49742 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:53.654314995 CEST | 443 | 49742 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.703380108 CEST | 443 | 49742 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.703479052 CEST | 49742 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.703562975 CEST | 49742 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.703578949 CEST | 443 | 49742 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.706656933 CEST | 49743 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.706770897 CEST | 443 | 49743 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.706906080 CEST | 49743 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.706998110 CEST | 49743 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.707025051 CEST | 443 | 49743 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.707077026 CEST | 49743 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.710196972 CEST | 49744 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.710258007 CEST | 443 | 49744 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:54.710361958 CEST | 49744 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.710763931 CEST | 49744 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:54.710788965 CEST | 443 | 49744 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:55.932692051 CEST | 443 | 49744 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:55.932749033 CEST | 49744 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:55.932858944 CEST | 49744 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:55.932887077 CEST | 443 | 49744 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:55.933635950 CEST | 49745 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:55.933687925 CEST | 443 | 49745 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:55.933748007 CEST | 49745 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:55.934338093 CEST | 49745 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:55.934350014 CEST | 443 | 49745 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:56.974122047 CEST | 443 | 49745 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:56.974323034 CEST | 49745 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:56.974427938 CEST | 49745 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:56.974445105 CEST | 443 | 49745 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:56.975295067 CEST | 49746 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:56.975368023 CEST | 443 | 49746 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:56.975455999 CEST | 49746 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:56.975595951 CEST | 49746 | 443 | 192.168.2.12 | 20.25.126.96 |
Oct 26, 2024 09:11:56.975636959 CEST | 443 | 49746 | 20.25.126.96 | 192.168.2.12 |
Oct 26, 2024 09:11:56.975688934 CEST | 49746 | 443 | 192.168.2.12 | 20.25.126.96 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 1 |
Start time: | 03:11:34 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\6GUgc6JYS1.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff78fd20000 |
File size: | 23'040 bytes |
MD5 hash: | 789BF0A8714E77D0D524BA22D8EFBD7E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 7 |
Start time: | 03:11:56 |
Start date: | 26/10/2024 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff603290000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 11% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 12.2% |
Total number of Nodes: | 196 |
Total number of Limit Nodes: | 2 |
Graph
Callgraph
Function 00007FF78FD21180 Relevance: 10.6, APIs: 7, Instructions: 138sleepstringCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD21A47 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 29COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000002598BC1012B Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 99networkCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF78FD23A40 Relevance: 3.0, APIs: 2, Instructions: 13synchronizationCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00007FF78FD22C20 Relevance: 7.2, APIs: 1, Strings: 3, Instructions: 232COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD22A40 Relevance: 12.4, APIs: 3, Strings: 4, Instructions: 138COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD22930 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 38COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD22A00 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD22A10 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD229E0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD229F0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD229D0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 25COMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF78FD22968 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 24COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|