Windows
Analysis Report
jgbC220X2U.exe
Overview
General Information
Sample name: | jgbC220X2U.exerenamed because original name is a hash value |
Original sample name: | f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe |
Analysis ID: | 1573000 |
MD5: | 28354f3e0d66d054bf0d05c3caf1e28a |
SHA1: | 612fa801d24607511387c8e051bd6de9e0d26b9e |
SHA256: | f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96 |
Tags: | exeloclx-iouser-JAMESWT_MHT |
Infos: | |
Detection
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Classification
- System is w10x64
jgbC220X2U.exe (PID: 1488 cmdline:
"C:\Users\ user\Deskt op\jgbC220 X2U.exe" MD5: 28354F3E0D66D054BF0D05C3CAF1E28A) conhost.exe (PID: 6500 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
⊘No yara matches
⊘No Sigma rule has matched
⊘No Suricata rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF72A03AB9D | |
Source: | Code function: | 0_2_00007FF72A06AA50 | |
Source: | Code function: | 0_2_00007FF72A0C6B00 | |
Source: | Code function: | 0_2_00007FF72A042348 | |
Source: | Code function: | 0_2_00007FF72A04234D | |
Source: | Code function: | 0_2_00007FF72A06A4D0 | |
Source: | Code function: | 0_2_00007FF72A02A510 | |
Source: | Code function: | 0_2_00007FF729FDE2A0 | |
Source: | Code function: | 0_2_00007FF729FDA8B0 | |
Source: | Code function: | 0_2_00007FF72A0166C0 | |
Source: | Code function: | 0_2_00007FF72A077BB0 | |
Source: | Code function: | 0_2_00007FF72A0739B0 | |
Source: | Code function: | 0_2_00007FF72A06BF80 | |
Source: | Code function: | 0_2_00007FF72A06FF10 | |
Source: | Code function: | 0_2_00007FF72A06B3B0 | |
Source: | Code function: | 0_2_00007FF72A06F150 | |
Source: | Code function: | 0_2_00007FF72A06B1F0 | |
Source: | Code function: | 0_2_00007FF729FD37E0 | |
Source: | Code function: | 0_2_00007FF72A077640 | |
Source: | Code function: | 0_2_00007FF72A028FF0 | |
Source: | Code function: | 0_2_00007FF72A07CEC0 | |
Source: | Code function: | 0_2_00007FF72A044348 | |
Source: | Code function: | 0_2_00007FF72A04434D | |
Source: | Code function: | 0_2_00007FF72A08C410 | |
Source: | Code function: | 0_2_00007FF72A06844A | |
Source: | Code function: | 0_2_00007FF72A068457 | |
Source: | Code function: | 0_2_00007FF72A0681F0 | |
Source: | Code function: | 0_2_00007FF72A0688B0 | |
Source: | Code function: | 0_2_00007FF72A06DB20 | |
Source: | Code function: | 0_2_00007FF72A021CE8 | |
Source: | Code function: | 0_2_00007FF72A021CED | |
Source: | Code function: | 0_2_00007FF72A08D970 | |
Source: | Code function: | 0_2_00007FF72A04602A | |
Source: | Code function: | 0_2_00007FF72A079E60 | |
Source: | Code function: | 0_2_00007FF72A079E60 | |
Source: | Code function: | 0_2_00007FF72A0793C0 | |
Source: | Code function: | 0_2_00007FF72A0793C0 | |
Source: | Code function: | 0_2_00007FF72A07D4E0 | |
Source: | Code function: | 0_2_00007FF72A03D12D | |
Source: | Code function: | 0_2_00007FF72A0AD1A0 | |
Source: | Code function: | 0_2_00007FF72A06D220 | |
Source: | Code function: | 0_2_00007FF72A0512B6 | |
Source: | Code function: | 0_2_00007FF72A0512B1 | |
Source: | Code function: | 0_2_00007FF72A00D520 | |
Source: | Code function: | 0_2_00007FF72A0681F0 |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00007FF72A0BFA30 |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: | 0_2_00007FF729FB2050 |
Source: | Code function: | 0_2_00007FF729FA5450 | |
Source: | Code function: | 0_2_00007FF729FCECA0 | |
Source: | Code function: | 0_2_00007FF729FF6CFE | |
Source: | Code function: | 0_2_00007FF729FF2AB0 | |
Source: | Code function: | 0_2_00007FF729F8AFA0 | |
Source: | Code function: | 0_2_00007FF729FE30B0 | |
Source: | Code function: | 0_2_00007FF72A0A6EA0 | |
Source: | Code function: | 0_2_00007FF729F8EF16 | |
Source: | Code function: | 0_2_00007FF729FCE380 | |
Source: | Code function: | 0_2_00007FF729FF2150 | |
Source: | Code function: | 0_2_00007FF729FDE2A0 | |
Source: | Code function: | 0_2_00007FF729FD6300 | |
Source: | Code function: | 0_2_00007FF729FEE815 | |
Source: | Code function: | 0_2_00007FF729FDA8B0 | |
Source: | Code function: | 0_2_00007FF729FFE900 | |
Source: | Code function: | 0_2_00007FF729FFA711 | |
Source: | Code function: | 0_2_00007FF729FF7B7E | |
Source: | Code function: | 0_2_00007FF729FFBFB0 | |
Source: | Code function: | 0_2_00007FF729F93FFA | |
Source: | Code function: | 0_2_00007FF729FEBD53 | |
Source: | Code function: | 0_2_00007FF729FF3DD0 | |
Source: | Code function: | 0_2_00007FF729FFF340 | |
Source: | Code function: | 0_2_00007FF729FF3480 | |
Source: | Code function: | 0_2_00007FF729FD7510 | |
Source: | Code function: | 0_2_00007FF729FE3270 | |
Source: | Code function: | 0_2_00007FF729FFB590 | |
Source: | Code function: | 0_2_00007FF729FEF6CA | |
Source: | Code function: | 0_2_00007FF72A068B30 | |
Source: | Code function: | 0_2_00007FF729FECB93 | |
Source: | Code function: | 0_2_00007FF729FF89DE | |
Source: | Code function: | 0_2_00007FF729FFC9F0 | |
Source: | Code function: | 0_2_00007FF729FF0EB0 | |
Source: | Code function: | 0_2_00007FF72A0103E0 | |
Source: | Code function: | 0_2_00007FF729FD84C0 | |
Source: | Code function: | 0_2_00007FF729FDC250 | |
Source: | Code function: | 0_2_00007FF729F848C0 | |
Source: | Code function: | 0_2_00007FF729FF0520 | |
Source: | Code function: | 0_2_00007FF729FA4690 | |
Source: | Code function: | 0_2_00007FF729FED9B3 | |
Source: | Code function: | 0_2_00007FF729FE1FE0 | |
Source: | Code function: | 0_2_00007FF72A012080 | |
Source: | Code function: | 0_2_00007FF729FCDE10 | |
Source: | Code function: | 0_2_00007FF729FE1E20 | |
Source: | Code function: | 0_2_00007FF729FFDE60 | |
Source: | Code function: | 0_2_00007FF729FF5EB0 | |
Source: | Code function: | 0_2_00007FF729F85360 | |
Source: | Code function: | 0_2_00007FF729FFD410 | |
Source: | Code function: | 0_2_00007FF729FDD290 | |
Source: | Code function: | 0_2_00007FF729FF1800 | |
Source: | Code function: | 0_2_00007FF72A00D520 |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00007FF729F815E0 |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | API coverage: |
Source: | Last function: |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00007FF729F9AB32 |
Source: | Code function: | 0_2_00007FF729F815E0 |
Source: | Code function: | 0_2_00007FF729F81154 |
Source: | Code function: | 0_2_00007FF729F9EAC0 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Process Injection | 1 Process Injection | OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | Data from Removable Media | 2 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 1 System Network Configuration Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 2 System Information Discovery | Distributed Component Object Model | Input Capture | 3 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
5% | ReversingLabs |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | phishing | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
eu.loclx.io | 167.99.38.229 | true | false | unknown | |
api.ipify.org | 172.67.74.152 | true | false | high | |
pepwuecibr.eu.loclx.io | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
167.99.38.229 | eu.loclx.io | United States | 14061 | DIGITALOCEAN-ASNUS | false | |
104.26.12.205 | unknown | United States | 13335 | CLOUDFLARENETUS | false | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1573000 |
Start date and time: | 2024-12-11 11:28:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | jgbC220X2U.exerenamed because original name is a hash value |
Original Sample Name: | f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe |
Detection: | MAL |
Classification: | mal48.winEXE@2/1@4/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- VT rate limit hit for: jgbC220X2U.exe
⊘No simulations
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.26.12.205 | Get hash | malicious | TrojanRansom | Browse |
| |
Get hash | malicious | TrojanRansom | Browse |
| ||
Get hash | malicious | RCRU64, TrojanRansom | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Targeted Ransomware | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
172.67.74.152 | Get hash | malicious | Targeted Ransomware, TrojanRansom | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
api.ipify.org | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Cobalt Strike, Remcos | Browse |
| |
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Anonymous Proxy | Browse |
| ||
Get hash | malicious | Anonymous Proxy | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Phisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Cobalt Strike, Remcos | Browse |
| |
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Anonymous Proxy | Browse |
| ||
Get hash | malicious | Anonymous Proxy | Browse |
|
⊘No context
⊘No context
Process: | C:\Users\user\Desktop\jgbC220X2U.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 336 |
Entropy (8bit): | 3.7406015629507228 |
Encrypted: | false |
SSDEEP: | 6:UoLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLFy:NFmFmFmFmFmFmFmFmFmFmFmFmFmFy |
MD5: | 13D131A6EDC53FE2FDADC4EA0203A08A |
SHA1: | 30F818ED02C33FB137D0F8B419B6538BBAEEE14B |
SHA-256: | 92185235AF3FBCF3F0157EFBDAAA9834B3A27CA66A4A00B1552F15448C21BAA3 |
SHA-512: | CF5DA223E39E7F85CBF6CA5D6C0DE04B12B9B51AA01A2555BDBCC83F021CE489915040518D4E7C2648C2E1300EF8547F329FA8721A24FD1739DB0ED75DD8E99F |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.889389316114988 |
TrID: |
|
File name: | jgbC220X2U.exe |
File size: | 7'131'898 bytes |
MD5: | 28354f3e0d66d054bf0d05c3caf1e28a |
SHA1: | 612fa801d24607511387c8e051bd6de9e0d26b9e |
SHA256: | f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96 |
SHA512: | a15e48bd8be9f74a98d6bb3cce4b2b55625629ea972fdd9a05179f5a6c6957b3bfa90883e6427cc66171fef49837912a58d230ac03c7aecd2b5c31775db2bb15 |
SSDEEP: | 98304:pUkIJaHXWPAfyCdpj6tDW47zhOBJkb9aiieIaH8CRwd9uzhOY2o3QwBSHsg5t61F:ikIRR5h6HE1rL5LGfvt2 |
TLSH: | E576D9A715AB5CE5EAC673BCB5C7623D9B34FC22CD69192F9204C435AC832847D2EB41 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g....*.....&....*.h...|......%..........@.....................................Um...`... ............................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x140001125 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x140000000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x670D7FE8 [Mon Oct 14 20:32:40 2024 UTC] |
TLS Callbacks: | 0x4000bfe0, 0x1, 0x4000c0a0, 0x1, 0x4001b54e, 0x1 |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | ef8b3b70a03909079864c2140721ce14 |
Instruction |
---|
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 30h |
mov dword ptr [ebp-04h], 000000FFh |
dec eax |
mov eax, dword ptr [001545B5h] |
mov dword ptr [eax], 00000000h |
call 00007F412122A703h |
mov dword ptr [ebp-04h], eax |
nop |
nop |
mov eax, dword ptr [ebp-04h] |
dec eax |
add esp, 30h |
pop ebp |
ret |
push ebp |
dec eax |
mov ebp, esp |
dec eax |
sub esp, 70h |
dec eax |
mov dword ptr [ebp-10h], 00000000h |
mov dword ptr [ebp-1Ch], 00000030h |
mov eax, dword ptr [ebp-1Ch] |
dec eax |
mov eax, dword ptr [eax] |
dec eax |
mov dword ptr [ebp-28h], eax |
dec eax |
mov eax, dword ptr [ebp-28h] |
dec eax |
mov eax, dword ptr [eax+08h] |
dec eax |
mov dword ptr [ebp-18h], eax |
mov dword ptr [ebp-04h], 00000000h |
jmp 00007F412122A713h |
dec eax |
mov eax, dword ptr [ebp-10h] |
dec eax |
cmp eax, dword ptr [ebp-18h] |
jne 00007F412122A6FBh |
mov dword ptr [ebp-04h], 00000001h |
jmp 00007F412122A737h |
mov ecx, 000003E8h |
dec eax |
mov eax, dword ptr [001A8746h] |
call eax |
dec eax |
mov eax, dword ptr [0015459Dh] |
dec eax |
mov dword ptr [ebp-30h], eax |
dec eax |
mov eax, dword ptr [ebp-18h] |
dec eax |
mov dword ptr [ebp-38h], eax |
dec eax |
mov dword ptr [ebp-40h], 00000000h |
dec eax |
mov ecx, dword ptr [ebp-38h] |
dec eax |
mov eax, dword ptr [ebp-40h] |
dec eax |
mov edx, dword ptr [ebp-30h] |
dec eax |
cmpxchg dword ptr [edx], ecx |
dec eax |
mov dword ptr [ebp-10h], eax |
dec eax |
cmp dword ptr [ebp-10h], 00000000h |
jne 00007F412122A69Ah |
dec eax |
mov eax, dword ptr [00154576h] |
mov eax, dword ptr [eax] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x1a9000 | 0x1d50 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x16a000 | 0x1a8d4 | .pdata |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1ad000 | 0x1d68 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x153f20 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x1a9768 | 0x638 | .idata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x146700 | 0x146800 | 77349d5ce0842838be283c444b1e7fa0 | False | 0.31570037327718226 | data | 6.011577155215405 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.data | 0x148000 | 0x4ca0 | 0x4e00 | 1a246a5035db48224f189597fa5571ea | False | 0.031600560897435896 | data | 0.5703995935155458 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x14d000 | 0x1b260 | 0x1b400 | 61af7993cdd0dd079eb666aeac4897be | False | 0.20101956708715596 | data | 5.289366783312055 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
/4 | 0x169000 | 0x4 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.pdata | 0x16a000 | 0x1a8d4 | 0x1aa00 | 32a19f1d5eaa9f8d6018332c3953aaa4 | False | 0.5223921654929577 | data | 6.170793177437251 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.xdata | 0x185000 | 0x2245c | 0x22600 | 8daf71ea83cefd59f84d26a67bd78028 | False | 0.17060369318181817 | shared library | 4.76992069970833 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.bss | 0x1a8000 | 0xd80 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x1a9000 | 0x1d50 | 0x1e00 | 85c7fb81abf5152ee91f00c23d90fe4a | False | 0.3067708333333333 | data | 4.470422394573293 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.CRT | 0x1ab000 | 0x68 | 0x200 | b9b680875ff1ac6dc2d841039d9c0882 | False | 0.076171875 | data | 0.37020935604047256 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x1ac000 | 0x10 | 0x200 | bf619eac0cdf3f68d496ea9344137e8b | False | 0.02734375 | data | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x1ad000 | 0x1d68 | 0x1e00 | f6f4e4b1783d86a4ba1b2e0d407ad73d | False | 0.35208333333333336 | data | 5.429210425100174 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/14 | 0x1af000 | 0xd0 | 0x200 | 4c5ccc9a8c7e1f50c9332e402fcdd6e6 | False | 0.154296875 | data | 0.8135941418709078 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/29 | 0x1b0000 | 0x46f9 | 0x4800 | 8a70cdea438dd463d8d169b649d5cef3 | False | 0.3792860243055556 | Matlab v4 mat-file (little endian) @\001, rows 134283269, columns 0, imaginary | 5.830938126363056 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/41 | 0x1b5000 | 0x8a5 | 0xa00 | 8c412e1ec809bc2d22840ac0c0dd9436 | False | 0.326953125 | data | 4.517567710861818 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/55 | 0x1b6000 | 0x97f | 0xa00 | 93edfdff4dd5e8ebd761fe7a54efc881 | False | 0.540625 | data | 4.789641841730167 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/67 | 0x1b7000 | 0x498 | 0x600 | 94009fe3acab9a4989e90d3e57374634 | False | 0.3444010416666667 | data | 3.151620531573487 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/80 | 0x1b8000 | 0xce | 0x200 | 292217cd9caa0647d900f44faf753dd5 | False | 0.34375 | data | 2.8722615854557496 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/91 | 0x1b9000 | 0x461 | 0x600 | 75a450f8317627827fe1cca60ebb0ae6 | False | 0.181640625 | data | 4.17072784657899 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/107 | 0x1ba000 | 0x88b | 0xa00 | fd46d698c19f66b45ec30d6988f5b6d4 | False | 0.398828125 | data | 4.021570199541239 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
/123 | 0x1bb000 | 0x108 | 0x200 | 06fb2fd98c2a2dd2828869db38f7cb4e | False | 0.294921875 | data | 2.3510720891965007 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
DLL | Import |
---|---|
KERNEL32.dll | AddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileMappingW, CreateFileW, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FormatMessageA, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFileSizeEx, GetHandleInformation, GetLastError, GetModuleHandleA, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LocalFree, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte |
api-ms-win-crt-convert-l1-1-0.dll | _ultoa, mbrtowc, strtol, strtoll, strtoul, strtoull, wcrtomb |
api-ms-win-crt-environment-l1-1-0.dll | __p__environ, __p__wenviron, getenv |
api-ms-win-crt-filesystem-l1-1-0.dll | _fstat64, _stat64 |
api-ms-win-crt-heap-l1-1-0.dll | _set_new_mode, calloc, free, malloc, realloc |
api-ms-win-crt-locale-l1-1-0.dll | ___lc_codepage_func, ___mb_cur_max_func, localeconv, setlocale |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr, _fdopen |
api-ms-win-crt-private-l1-1-0.dll | __C_specific_handler, __intrinsic_setjmpex, longjmp, memchr, memcmp, memcpy, memmove, strchr |
api-ms-win-crt-runtime-l1-1-0.dll | __p___argc, __p___argv, __p___wargv, _assert, _beginthreadex, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _exit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal, strerror, system |
api-ms-win-crt-stdio-l1-1-0.dll | __acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vswprintf, _fileno, _fseeki64, _ftelli64, _lseeki64, _read, _wfopen, _write, fclose, fflush, fgetwc, fopen, fputc, fputs, fread, fwrite, getc, getwc, putc, putwc, setvbuf, ungetc, ungetwc |
api-ms-win-crt-string-l1-1-0.dll | _strdup, iswctype, memset, strcmp, strcoll, strlen, strncmp, strxfrm, towlower, towupper, wcscoll, wcslen, wcsxfrm |
api-ms-win-crt-time-l1-1-0.dll | __daylight, __timezone, __tzname, _tzset, strftime, wcsftime |
api-ms-win-crt-utility-l1-1-0.dll | rand_s |
WS2_32.dll | WSACleanup, WSAGetLastError, WSASocketW, WSAStartup, __WSAFDIsSet, closesocket, connect, freeaddrinfo, getaddrinfo, getnameinfo, getpeername, getsockname, getsockopt, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 11, 2024 11:28:58.618937016 CET | 49704 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:28:58.742666960 CET | 80 | 49704 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:28:58.742782116 CET | 49704 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:28:58.776192904 CET | 49704 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:28:58.898510933 CET | 80 | 49704 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:28:59.841166019 CET | 80 | 49704 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:28:59.841892958 CET | 49704 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:28:59.841926098 CET | 80 | 49704 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:28:59.842000961 CET | 49704 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:28:59.964108944 CET | 80 | 49704 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:00.476305008 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:00.599672079 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:00.599808931 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:00.612281084 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:00.735930920 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:00.735989094 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:00.860642910 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.844504118 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.844525099 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.844536066 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.844670057 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:01.844922066 CET | 49705 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:01.862426043 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:01.970168114 CET | 80 | 49705 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.987384081 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:01.987464905 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:01.987719059 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:02.111521006 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:03.231303930 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:03.231328011 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:03.231349945 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:03.231373072 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:03.231414080 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:03.232486963 CET | 49706 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:03.357249975 CET | 80 | 49706 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:08.222858906 CET | 49707 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:08.346604109 CET | 80 | 49707 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:08.346791029 CET | 49707 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:08.347069979 CET | 49707 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:08.467957973 CET | 80 | 49707 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:09.444174051 CET | 80 | 49707 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:09.444520950 CET | 80 | 49707 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:09.444525957 CET | 49707 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:09.444575071 CET | 49707 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:09.445609093 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:09.565968990 CET | 80 | 49707 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:09.565984964 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:09.566185951 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:09.566456079 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:09.686184883 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:09.686248064 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:09.805650949 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.803586960 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.803620100 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.803632975 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.803716898 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:10.803757906 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:10.804024935 CET | 49708 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:10.805242062 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:10.923233986 CET | 80 | 49708 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.924577951 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:10.924681902 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:10.940543890 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:11.060894012 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:12.177777052 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:12.177824020 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:12.177912951 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:12.179074049 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:12.179132938 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:12.179236889 CET | 49709 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:12.298531055 CET | 80 | 49709 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:17.191245079 CET | 49714 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:17.310621977 CET | 80 | 49714 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:17.310827017 CET | 49714 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:17.311166048 CET | 49714 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:17.430489063 CET | 80 | 49714 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:18.416271925 CET | 80 | 49714 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:18.416594028 CET | 49714 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:18.417280912 CET | 80 | 49714 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:18.417356014 CET | 49714 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:18.417546034 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:18.535995960 CET | 80 | 49714 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:18.536818027 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:18.537636995 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:18.538021088 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:18.657259941 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:18.657406092 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:18.777507067 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.777371883 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.777470112 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.777481079 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.777533054 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:19.777764082 CET | 49715 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:19.779202938 CET | 49722 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:19.897191048 CET | 80 | 49715 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.898448944 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:19.898566008 CET | 49722 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:19.898974895 CET | 49722 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:20.019660950 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:21.139556885 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:21.139596939 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:21.139638901 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:21.139748096 CET | 49722 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:21.157259941 CET | 49722 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:21.276712894 CET | 80 | 49722 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:26.160058022 CET | 49739 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:26.279346943 CET | 80 | 49739 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:26.279480934 CET | 49739 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:26.279794931 CET | 49739 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:26.401876926 CET | 80 | 49739 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:27.468954086 CET | 80 | 49739 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:27.468986034 CET | 80 | 49739 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:27.469058037 CET | 49739 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:27.469275951 CET | 49739 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:27.470248938 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:27.588727951 CET | 80 | 49739 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:27.589598894 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:27.589725018 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:27.589978933 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:27.709287882 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:27.713669062 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:27.832911968 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.824376106 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.824450016 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.824465990 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.824501038 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:28.824537039 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:28.824805021 CET | 49740 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:28.826442957 CET | 49746 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:28.944211960 CET | 80 | 49740 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.945799112 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:28.945935965 CET | 49746 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:28.946234941 CET | 49746 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:29.065547943 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:30.188648939 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:30.188750029 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:30.188760996 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:30.188834906 CET | 49746 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:30.189090967 CET | 49746 | 80 | 192.168.2.5 | 167.99.38.229 |
Dec 11, 2024 11:29:30.308557034 CET | 80 | 49746 | 167.99.38.229 | 192.168.2.5 |
Dec 11, 2024 11:29:35.191498995 CET | 49762 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:35.310954094 CET | 80 | 49762 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:35.313772917 CET | 49762 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:35.314178944 CET | 49762 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:35.434171915 CET | 80 | 49762 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:36.414221048 CET | 80 | 49762 | 172.67.74.152 | 192.168.2.5 |
Dec 11, 2024 11:29:36.414546013 CET | 49762 | 80 | 192.168.2.5 | 172.67.74.152 |
Dec 11, 2024 11:29:36.415210009 CET |