Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jgbC220X2U.exe

Overview

General Information

Sample name:jgbC220X2U.exe
renamed because original name is a hash value
Original sample name:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe
Analysis ID:1573000
MD5:28354f3e0d66d054bf0d05c3caf1e28a
SHA1:612fa801d24607511387c8e051bd6de9e0d26b9e
SHA256:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96
Tags:exeloclx-iouser-JAMESWT_MHT
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May check the online IP address of the machine
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • jgbC220X2U.exe (PID: 1488 cmdline: "C:\Users\user\Desktop\jgbC220X2U.exe" MD5: 28354F3E0D66D054BF0D05C3CAF1E28A)
    • conhost.exe (PID: 6500 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://pepwuecibr.eu.loclx.io/commandAvira URL Cloud: Label: phishing
Source: http://pepwuecibr.eu.loclx.ioAvira URL Cloud: Label: phishing
Source: http://pepwuecibr.eu.loclx.io/statusAvira URL Cloud: Label: phishing
Source: jgbC220X2U.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A03AB9D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06AA50
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF72A0C6B00
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A042348
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A04234D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06A4D0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A02A510
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rbp0_2_00007FF729FDE2A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r150_2_00007FF729FDA8B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r140_2_00007FF72A0166C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 38h0_2_00007FF72A077BB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then sub rsp, 38h0_2_00007FF72A0739B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06BF80
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06FF10
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06B3B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06F150
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06B1F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rcx]0_2_00007FF729FD37E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A077640
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A028FF0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A07CEC0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A041000h0_2_00007FF72A044348
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A041000h0_2_00007FF72A04434D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+10h]0_2_00007FF72A08C410
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A06844A
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A068457
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A0681F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A0688B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06DB20
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A01E8D0h0_2_00007FF72A021CE8
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then jmp 00007FF72A01E8D0h0_2_00007FF72A021CED
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+10h]0_2_00007FF72A08D970
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A04602A
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A079E60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A079E60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A0793C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r130_2_00007FF72A0793C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rsi0_2_00007FF72A07D4E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push rdi0_2_00007FF72A03D12D
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then lea rdx, qword ptr [rbp-31h]0_2_00007FF72A0AD1A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rax, qword ptr [rbp+38h]0_2_00007FF72A06D220
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r120_2_00007FF72A0512B6
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r120_2_00007FF72A0512B1
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then push r150_2_00007FF72A00D520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 4x nop then mov rcx, rsi0_2_00007FF72A0681F0
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0BFA30 recv,recv,0_2_00007FF72A0BFA30
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficHTTP traffic detected: GET /?format=text HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: api.ipify.orgConnection: close
Source: global trafficHTTP traffic detected: GET /command HTTP/1.1User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: close
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: pepwuecibr.eu.loclx.io
Source: unknownHTTP traffic detected: POST /status HTTP/1.1Content-Length: 39User-Agent: cpp-httplib/0.18.0Accept: */*Host: pepwuecibr.eu.loclx.ioConnection: closeContent-Type: application/json
Source: jgbC220X2U.exeString found in binary or memory: http://api.ipify.org
Source: jgbC220X2U.exeString found in binary or memory: http://api.ipify.org/?format=textUnknown
Source: jgbC220X2U.exeString found in binary or memory: http://pepwuecibr.eu.loclx.io
Source: jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.
Source: jgbC220X2U.exe, 00000000.00000002.3289536896.00000089B8FF9000.00000004.00000010.00020000.00000000.sdmp, jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Nunito:700
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FB2050 ntohs,ntohs,getnameinfo,0_2_00007FF729FB2050
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FA54500_2_00007FF729FA5450
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCECA00_2_00007FF729FCECA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF6CFE0_2_00007FF729FF6CFE
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF2AB00_2_00007FF729FF2AB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F8AFA00_2_00007FF729F8AFA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE30B00_2_00007FF729FE30B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0A6EA00_2_00007FF72A0A6EA0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F8EF160_2_00007FF729F8EF16
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCE3800_2_00007FF729FCE380
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF21500_2_00007FF729FF2150
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDE2A00_2_00007FF729FDE2A0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD63000_2_00007FF729FD6300
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEE8150_2_00007FF729FEE815
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDA8B00_2_00007FF729FDA8B0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFE9000_2_00007FF729FFE900
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFA7110_2_00007FF729FFA711
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF7B7E0_2_00007FF729FF7B7E
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFBFB00_2_00007FF729FFBFB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F93FFA0_2_00007FF729F93FFA
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEBD530_2_00007FF729FEBD53
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF3DD00_2_00007FF729FF3DD0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFF3400_2_00007FF729FFF340
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF34800_2_00007FF729FF3480
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD75100_2_00007FF729FD7510
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE32700_2_00007FF729FE3270
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFB5900_2_00007FF729FFB590
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FEF6CA0_2_00007FF729FEF6CA
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A068B300_2_00007FF72A068B30
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FECB930_2_00007FF729FECB93
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF89DE0_2_00007FF729FF89DE
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFC9F00_2_00007FF729FFC9F0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF0EB00_2_00007FF729FF0EB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0103E00_2_00007FF72A0103E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FD84C00_2_00007FF729FD84C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDC2500_2_00007FF729FDC250
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F848C00_2_00007FF729F848C0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF05200_2_00007FF729FF0520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FA46900_2_00007FF729FA4690
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FED9B30_2_00007FF729FED9B3
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE1FE00_2_00007FF729FE1FE0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A0120800_2_00007FF72A012080
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FCDE100_2_00007FF729FCDE10
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FE1E200_2_00007FF729FE1E20
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFDE600_2_00007FF729FFDE60
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF5EB00_2_00007FF729FF5EB0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F853600_2_00007FF729F85360
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FFD4100_2_00007FF729FFD410
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FDD2900_2_00007FF729FDD290
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729FF18000_2_00007FF729FF1800
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF72A00D5200_2_00007FF72A00D520
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A075680 appears 138 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0B3870 appears 41 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0B4720 appears 158 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A076010 appears 126 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4650 appears 75 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C44B0 appears 50 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4780 appears 166 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C65D0 appears 103 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0577D0 appears 182 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C66C0 appears 103 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A0C4B10 appears 43 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A071D40 appears 50 times
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: String function: 00007FF72A069B50 appears 129 times
Source: jgbC220X2U.exeStatic PE information: Number of sections : 20 > 10
Source: classification engineClassification label: mal48.winEXE@2/1@4/3
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6500:120:WilError_03
Source: jgbC220X2U.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\jgbC220X2U.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\jgbC220X2U.exe "C:\Users\user\Desktop\jgbC220X2U.exe"
Source: C:\Users\user\Desktop\jgbC220X2U.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\jgbC220X2U.exeSection loaded: fwpuclnt.dllJump to behavior
Source: jgbC220X2U.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: jgbC220X2U.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: jgbC220X2U.exeStatic file information: File size 7131898 > 1048576
Source: jgbC220X2U.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x146800
Source: jgbC220X2U.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F815E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF729F815E0
Source: jgbC220X2U.exeStatic PE information: section name: /4
Source: jgbC220X2U.exeStatic PE information: section name: .xdata
Source: jgbC220X2U.exeStatic PE information: section name: /14
Source: jgbC220X2U.exeStatic PE information: section name: /29
Source: jgbC220X2U.exeStatic PE information: section name: /41
Source: jgbC220X2U.exeStatic PE information: section name: /55
Source: jgbC220X2U.exeStatic PE information: section name: /67
Source: jgbC220X2U.exeStatic PE information: section name: /80
Source: jgbC220X2U.exeStatic PE information: section name: /91
Source: jgbC220X2U.exeStatic PE information: section name: /107
Source: jgbC220X2U.exeStatic PE information: section name: /123
Source: C:\Users\user\Desktop\jgbC220X2U.exeAPI coverage: 2.2 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F9AB32 IsDebuggerPresent,RaiseException,0_2_00007FF729F9AB32
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F815E0 GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF729F815E0
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F81154 Sleep,_initterm,_initterm,SetUnhandledExceptionFilter,_set_invalid_parameter_handler,exit,_cexit,0_2_00007FF729F81154
Source: C:\Users\user\Desktop\jgbC220X2U.exeCode function: 0_2_00007FF729F9EAC0 _errno,GetSystemTimeAsFileTime,GetSystemTimeAsFileTime,_errno,0_2_00007FF729F9EAC0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
Obfuscated Files or Information
Security Account Manager1
System Network Configuration Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Information Discovery
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
jgbC220X2U.exe5%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://pepwuecibr.eu.loclx.io/command100%Avira URL Cloudphishing
http://pepwuecibr.eu.loclx.io100%Avira URL Cloudphishing
http://pepwuecibr.eu.loclx.io/status100%Avira URL Cloudphishing
https://fonts.googleapis.0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
eu.loclx.io
167.99.38.229
truefalse
    unknown
    api.ipify.org
    172.67.74.152
    truefalse
      high
      pepwuecibr.eu.loclx.io
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        http://pepwuecibr.eu.loclx.io/statusfalse
        • Avira URL Cloud: phishing
        unknown
        http://pepwuecibr.eu.loclx.io/commandfalse
        • Avira URL Cloud: phishing
        unknown
        http://api.ipify.org/?format=textfalse
          high
          NameSourceMaliciousAntivirus DetectionReputation
          https://fonts.googleapis.jgbC220X2U.exe, 00000000.00000002.3289657421.00000248F1DE8000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://pepwuecibr.eu.loclx.iojgbC220X2U.exefalse
          • Avira URL Cloud: phishing
          unknown
          http://api.ipify.org/?format=textUnknownjgbC220X2U.exefalse
            high
            http://api.ipify.orgjgbC220X2U.exefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              167.99.38.229
              eu.loclx.ioUnited States
              14061DIGITALOCEAN-ASNUSfalse
              104.26.12.205
              unknownUnited States
              13335CLOUDFLARENETUSfalse
              172.67.74.152
              api.ipify.orgUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1573000
              Start date and time:2024-12-11 11:28:06 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 5m 22s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:jgbC220X2U.exe
              renamed because original name is a hash value
              Original Sample Name:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96.exe
              Detection:MAL
              Classification:mal48.winEXE@2/1@4/3
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 98%
              • Number of executed functions: 15
              • Number of non-executed functions: 162
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.175.87.197
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: jgbC220X2U.exe
              No simulations
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              104.26.12.205xKvkNk9SXR.exeGet hashmaliciousTrojanRansomBrowse
              • api.ipify.org/
              GD8c7ARn8q.exeGet hashmaliciousTrojanRansomBrowse
              • api.ipify.org/
              8AbMCL2dxM.exeGet hashmaliciousRCRU64, TrojanRansomBrowse
              • api.ipify.org/
              Simple2.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
              • api.ipify.org/
              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              6706e721f2c06.exeGet hashmaliciousRemcosBrowse
              • api.ipify.org/
              perfcc.elfGet hashmaliciousXmrigBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              172.67.74.152malware.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
              • api.ipify.org/
              Simple1.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Simple2.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              systemConfigChecker.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              systemConfigChecker.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
              • api.ipify.org/
              Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
              • api.ipify.org/
              4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
              • api.ipify.org/
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              api.ipify.orgQUOTATION#08670.exeGet hashmaliciousAgentTeslaBrowse
              • 172.67.74.152
              INVOICE NO. USF23-24072 IGR23110.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              EEMsLiXoiTzoaDd.scrGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 172.67.74.152
              Statement 2024-11-29 (K07234).exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.12.205
              Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
              • 104.26.13.205
              1mr7lpFIVI.exeGet hashmaliciousUnknownBrowse
              • 104.26.12.205
              jKDBppzWTb.exeGet hashmaliciousAgentTeslaBrowse
              • 172.67.74.152
              enyi.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
              • 104.26.13.205
              proforma invoice.exeGet hashmaliciousAgentTeslaBrowse
              • 104.26.13.205
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CLOUDFLARENETUSnicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              invoice09850.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.6
              Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 104.21.86.72
              EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.78.149
              https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
              • 104.18.41.169
              https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
              • 104.18.95.41
              Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
              • 172.64.41.3
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 104.21.37.221
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 172.67.213.233
              DIGITALOCEAN-ASNUShttps://hongkongliving.comGet hashmaliciousCAPTCHA Scam ClickFixBrowse
              • 159.89.194.120
              http://prntbl.concejomunicipaldechinu.gov.coGet hashmaliciousUnknownBrowse
              • 167.172.148.114
              Josho.arm.elfGet hashmaliciousUnknownBrowse
              • 157.230.180.175
              hax.arm.elfGet hashmaliciousMiraiBrowse
              • 45.55.195.236
              http://abercombie.comGet hashmaliciousUnknownBrowse
              • 104.248.224.96
              https://listafrica.org/Receipt.htmlGet hashmaliciousWinSearchAbuseBrowse
              • 68.183.112.81
              https://t.ly/8cSDxGet hashmaliciousUnknownBrowse
              • 188.166.17.21
              Forhandlingsfriheden.exeGet hashmaliciousFormBook, GuLoaderBrowse
              • 165.22.38.185
              http://email.edms.trackingmore.com/c/eJx0zrFuhDAMgOGnCWPE2YHAkKELr4FsxwF05EBJWun69JU6den8D_8XQz88mKXT8PCICDi6udsDJB44oUuePHiZGCABe0UvMAlP3RGGSSHOI4w--d7NiUdBAlQPKglkNq7Pb9sKyfN4bfkqauXK3Rn21m6DHwYWA0usZKlGu50X03lT2-tOJ1mNn_Z1G1hK7PJ7zVorbboe8Y9z_T7kWS7W0tD1xvVbpuP8vZTwf_sK8BMAAP__3p9Nvw#4UjjVf19156dXgi477henjyiztuh1607QELNKWKBNFUHFFI32RLCJ32096s9/84502vqzGet hashmaliciousPhisherBrowse
              • 159.65.226.43
              la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
              • 188.166.27.224
              CLOUDFLARENETUSnicegirlforyou.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              nicewithgreatfeaturesreturnformebestthingsgivensoofar.htaGet hashmaliciousCobalt Strike, RemcosBrowse
              • 104.21.84.67
              invoice09850.xlsGet hashmaliciousRemcosBrowse
              • 188.114.96.6
              Reqt 83291.vbsGet hashmaliciousRemcos, GuLoaderBrowse
              • 104.21.86.72
              EBUdultKh7.exeGet hashmaliciousLummaC StealerBrowse
              • 104.21.78.149
              https://@%EF%BD%88%EF%BD%94%EF%BD%94%EF%BD%90%EF%BD%93%EF%BC%9A%E2%93%97%E2%93%A3%E2%93%A3%E2%93%9F%E2%93%A2:@%74%72%61%6E%73%6C%61%74%65.google.al/%74%72%61%6E%73%6C%61%74%65?sl=auto&tl=en&hl=en-US&u=https://google.com/amp/%F0%9F%84%B8%F0%9F%84%BF%F0%9F%84%B5%F0%9F%85%82.%E2%93%98%E2%93%9E/%69%70%66%73/%62%61%66%79%62%65%69%64%66%32%67%68%76%35%76%61%6B%65%71%6C%63%71%71%76%7A%66%73%65%74%74%37%75%7A%73%65%71%6D%6D%75%74%6E%75%61%65%73%74%6F%7A%71%69%6F%75%65%66%32%72%71%32%79%23XNick.Atkin@Yorkshirehousing.co.ukGet hashmaliciousHTMLPhisherBrowse
              • 104.18.41.169
              https://renemattner.simvoly.com/?preview=__PREVIEW_ONLY&c=E,1,Ks6Sg62CfOE_CkRSGsjWzEZqQJ4kslHIx5N9ygK8IrTT7dwyHfXwvE4VbQEnQwQXPVvQMpZGcaIV_fVQbP7vMcdrXBRSSDaH5Z18aBsWUw,,&typo=1Get hashmaliciousHTMLPhisherBrowse
              • 104.18.95.41
              Nieuwebestellingen10122024.exeGet hashmaliciousFormBookBrowse
              • 172.64.41.3
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 104.21.37.221
              https://smialex.id/FrbleuelsasGet hashmaliciousAnonymous ProxyBrowse
              • 172.67.213.233
              No context
              No context
              Process:C:\Users\user\Desktop\jgbC220X2U.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):336
              Entropy (8bit):3.7406015629507228
              Encrypted:false
              SSDEEP:6:UoLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLF3oLFy:NFmFmFmFmFmFmFmFmFmFmFmFmFmFy
              MD5:13D131A6EDC53FE2FDADC4EA0203A08A
              SHA1:30F818ED02C33FB137D0F8B419B6538BBAEEE14B
              SHA-256:92185235AF3FBCF3F0157EFBDAAA9834B3A27CA66A4A00B1552F15448C21BAA3
              SHA-512:CF5DA223E39E7F85CBF6CA5D6C0DE04B12B9B51AA01A2555BDBCC83F021CE489915040518D4E7C2648C2E1300EF8547F329FA8721A24FD1739DB0ED75DD8E99F
              Malicious:false
              Reputation:low
              Preview:Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...Failed to send status...
              File type:PE32+ executable (console) x86-64, for MS Windows
              Entropy (8bit):5.889389316114988
              TrID:
              • Win64 Executable Console (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:jgbC220X2U.exe
              File size:7'131'898 bytes
              MD5:28354f3e0d66d054bf0d05c3caf1e28a
              SHA1:612fa801d24607511387c8e051bd6de9e0d26b9e
              SHA256:f88fa3aa1dc3a59d1914254917c835783d84d384675f3622dde5aa7893952c96
              SHA512:a15e48bd8be9f74a98d6bb3cce4b2b55625629ea972fdd9a05179f5a6c6957b3bfa90883e6427cc66171fef49837912a58d230ac03c7aecd2b5c31775db2bb15
              SSDEEP:98304:pUkIJaHXWPAfyCdpj6tDW47zhOBJkb9aiieIaH8CRwd9uzhOY2o3QwBSHsg5t61F:ikIRR5h6HE1rL5LGfvt2
              TLSH:E576D9A715AB5CE5EAC673BCB5C7623D9B34FC22CD69192F9204C435AC832847D2EB41
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g....*.....&....*.h...|......%..........@.....................................Um...`... ............................
              Icon Hash:00928e8e8686b000
              Entrypoint:0x140001125
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x670D7FE8 [Mon Oct 14 20:32:40 2024 UTC]
              TLS Callbacks:0x4000bfe0, 0x1, 0x4000c0a0, 0x1, 0x4001b54e, 0x1
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:ef8b3b70a03909079864c2140721ce14
              Instruction
              push ebp
              dec eax
              mov ebp, esp
              dec eax
              sub esp, 30h
              mov dword ptr [ebp-04h], 000000FFh
              dec eax
              mov eax, dword ptr [001545B5h]
              mov dword ptr [eax], 00000000h
              call 00007F412122A703h
              mov dword ptr [ebp-04h], eax
              nop
              nop
              mov eax, dword ptr [ebp-04h]
              dec eax
              add esp, 30h
              pop ebp
              ret
              push ebp
              dec eax
              mov ebp, esp
              dec eax
              sub esp, 70h
              dec eax
              mov dword ptr [ebp-10h], 00000000h
              mov dword ptr [ebp-1Ch], 00000030h
              mov eax, dword ptr [ebp-1Ch]
              dec eax
              mov eax, dword ptr [eax]
              dec eax
              mov dword ptr [ebp-28h], eax
              dec eax
              mov eax, dword ptr [ebp-28h]
              dec eax
              mov eax, dword ptr [eax+08h]
              dec eax
              mov dword ptr [ebp-18h], eax
              mov dword ptr [ebp-04h], 00000000h
              jmp 00007F412122A713h
              dec eax
              mov eax, dword ptr [ebp-10h]
              dec eax
              cmp eax, dword ptr [ebp-18h]
              jne 00007F412122A6FBh
              mov dword ptr [ebp-04h], 00000001h
              jmp 00007F412122A737h
              mov ecx, 000003E8h
              dec eax
              mov eax, dword ptr [001A8746h]
              call eax
              dec eax
              mov eax, dword ptr [0015459Dh]
              dec eax
              mov dword ptr [ebp-30h], eax
              dec eax
              mov eax, dword ptr [ebp-18h]
              dec eax
              mov dword ptr [ebp-38h], eax
              dec eax
              mov dword ptr [ebp-40h], 00000000h
              dec eax
              mov ecx, dword ptr [ebp-38h]
              dec eax
              mov eax, dword ptr [ebp-40h]
              dec eax
              mov edx, dword ptr [ebp-30h]
              dec eax
              cmpxchg dword ptr [edx], ecx
              dec eax
              mov dword ptr [ebp-10h], eax
              dec eax
              cmp dword ptr [ebp-10h], 00000000h
              jne 00007F412122A69Ah
              dec eax
              mov eax, dword ptr [00154576h]
              mov eax, dword ptr [eax]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x1a90000x1d50.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x16a0000x1a8d4.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1ad0000x1d68.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x153f200x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x1a97680x638.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x1467000x14680077349d5ce0842838be283c444b1e7fa0False0.31570037327718226data6.011577155215405IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x1480000x4ca00x4e001a246a5035db48224f189597fa5571eaFalse0.031600560897435896data0.5703995935155458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x14d0000x1b2600x1b40061af7993cdd0dd079eb666aeac4897beFalse0.20101956708715596data5.289366783312055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              /40x1690000x40x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0x16a0000x1a8d40x1aa0032a19f1d5eaa9f8d6018332c3953aaa4False0.5223921654929577data6.170793177437251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .xdata0x1850000x2245c0x226008daf71ea83cefd59f84d26a67bd78028False0.17060369318181817shared library4.76992069970833IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .bss0x1a80000xd800x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x1a90000x1d500x1e0085c7fb81abf5152ee91f00c23d90fe4aFalse0.3067708333333333data4.470422394573293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .CRT0x1ab0000x680x200b9b680875ff1ac6dc2d841039d9c0882False0.076171875data0.37020935604047256IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x1ac0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x1ad0000x1d680x1e00f6f4e4b1783d86a4ba1b2e0d407ad73dFalse0.35208333333333336data5.429210425100174IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /140x1af0000xd00x2004c5ccc9a8c7e1f50c9332e402fcdd6e6False0.154296875data0.8135941418709078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /290x1b00000x46f90x48008a70cdea438dd463d8d169b649d5cef3False0.3792860243055556Matlab v4 mat-file (little endian) @\001, rows 134283269, columns 0, imaginary5.830938126363056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /410x1b50000x8a50xa008c412e1ec809bc2d22840ac0c0dd9436False0.326953125data4.517567710861818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /550x1b60000x97f0xa0093edfdff4dd5e8ebd761fe7a54efc881False0.540625data4.789641841730167IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /670x1b70000x4980x60094009fe3acab9a4989e90d3e57374634False0.3444010416666667data3.151620531573487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /800x1b80000xce0x200292217cd9caa0647d900f44faf753dd5False0.34375data2.8722615854557496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /910x1b90000x4610x60075a450f8317627827fe1cca60ebb0ae6False0.181640625data4.17072784657899IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /1070x1ba0000x88b0xa00fd46d698c19f66b45ec30d6988f5b6d4False0.398828125data4.021570199541239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              /1230x1bb0000x1080x20006fb2fd98c2a2dd2828869db38f7cb4eFalse0.294921875data2.3510720891965007IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CreateEventA, CreateFileMappingW, CreateFileW, CreateSemaphoreA, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, FormatMessageA, FreeLibrary, GetCurrentProcess, GetCurrentProcessId, GetCurrentThread, GetCurrentThreadId, GetFileSizeEx, GetHandleInformation, GetLastError, GetModuleHandleA, GetProcAddress, GetProcessAffinityMask, GetSystemTimeAsFileTime, GetThreadContext, GetThreadPriority, GetTickCount64, InitializeCriticalSection, IsDebuggerPresent, LeaveCriticalSection, LoadLibraryA, LocalFree, MapViewOfFile, MultiByteToWideChar, OpenProcess, OutputDebugStringA, RaiseException, ReleaseSemaphore, RemoveVectoredExceptionHandler, ResetEvent, ResumeThread, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlVirtualUnwind, SetEvent, SetLastError, SetProcessAffinityMask, SetThreadContext, SetThreadPriority, SetUnhandledExceptionFilter, Sleep, SuspendThread, TlsAlloc, TlsGetValue, TlsSetValue, TryEnterCriticalSection, UnmapViewOfFile, VirtualProtect, VirtualQuery, WaitForMultipleObjects, WaitForSingleObject, WideCharToMultiByte
              api-ms-win-crt-convert-l1-1-0.dll_ultoa, mbrtowc, strtol, strtoll, strtoul, strtoull, wcrtomb
              api-ms-win-crt-environment-l1-1-0.dll__p__environ, __p__wenviron, getenv
              api-ms-win-crt-filesystem-l1-1-0.dll_fstat64, _stat64
              api-ms-win-crt-heap-l1-1-0.dll_set_new_mode, calloc, free, malloc, realloc
              api-ms-win-crt-locale-l1-1-0.dll___lc_codepage_func, ___mb_cur_max_func, localeconv, setlocale
              api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _fdopen
              api-ms-win-crt-private-l1-1-0.dll__C_specific_handler, __intrinsic_setjmpex, longjmp, memchr, memcmp, memcpy, memmove, strchr
              api-ms-win-crt-runtime-l1-1-0.dll__p___argc, __p___argv, __p___wargv, _assert, _beginthreadex, _cexit, _configure_narrow_argv, _configure_wide_argv, _crt_at_quick_exit, _crt_atexit, _endthreadex, _errno, _exit, _initialize_narrow_environment, _initialize_wide_environment, _initterm, _set_app_type, _set_invalid_parameter_handler, abort, exit, signal, strerror, system
              api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, __p__commode, __p__fmode, __stdio_common_vfprintf, __stdio_common_vfwprintf, __stdio_common_vsprintf, __stdio_common_vswprintf, _fileno, _fseeki64, _ftelli64, _lseeki64, _read, _wfopen, _write, fclose, fflush, fgetwc, fopen, fputc, fputs, fread, fwrite, getc, getwc, putc, putwc, setvbuf, ungetc, ungetwc
              api-ms-win-crt-string-l1-1-0.dll_strdup, iswctype, memset, strcmp, strcoll, strlen, strncmp, strxfrm, towlower, towupper, wcscoll, wcslen, wcsxfrm
              api-ms-win-crt-time-l1-1-0.dll__daylight, __timezone, __tzname, _tzset, strftime, wcsftime
              api-ms-win-crt-utility-l1-1-0.dllrand_s
              WS2_32.dllWSACleanup, WSAGetLastError, WSASocketW, WSAStartup, __WSAFDIsSet, closesocket, connect, freeaddrinfo, getaddrinfo, getnameinfo, getpeername, getsockname, getsockopt, ioctlsocket, ntohs, recv, select, send, setsockopt, shutdown, socket
              TimestampSource PortDest PortSource IPDest IP
              Dec 11, 2024 11:28:58.618937016 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.742666960 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:58.742782116 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.776192904 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:58.898510933 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.841166019 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.841892958 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:59.841926098 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:28:59.842000961 CET4970480192.168.2.5172.67.74.152
              Dec 11, 2024 11:28:59.964108944 CET8049704172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:00.476305008 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.599672079 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:00.599808931 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.612281084 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.735930920 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:00.735989094 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:00.860642910 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844504118 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844525099 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844536066 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.844670057 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.844922066 CET4970580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.862426043 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.970168114 CET8049705167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.987384081 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:01.987464905 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:01.987719059 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:02.111521006 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231303930 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231328011 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231349945 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:03.231373072 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.231414080 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.232486963 CET4970680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:03.357249975 CET8049706167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:08.222858906 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.346604109 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:08.346791029 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.347069979 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:08.467957973 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444174051 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444520950 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.444525957 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:09.444575071 CET4970780192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:09.445609093 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.565968990 CET8049707172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:09.565984964 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:09.566185951 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.566456079 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.686184883 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:09.686248064 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:09.805650949 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803586960 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803620100 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803632975 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.803716898 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.803757906 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.804024935 CET4970880192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.805242062 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.923233986 CET8049708167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.924577951 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:10.924681902 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:10.940543890 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:11.060894012 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177777052 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177824020 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.177912951 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.179074049 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:12.179132938 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.179236889 CET4970980192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:12.298531055 CET8049709167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:17.191245079 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.310621977 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:17.310827017 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.311166048 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:17.430489063 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.416271925 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.416594028 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:18.417280912 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.417356014 CET4971480192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:18.417546034 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.535995960 CET8049714172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:18.536818027 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:18.537636995 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.538021088 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.657259941 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:18.657406092 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:18.777507067 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777371883 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777470112 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777481079 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.777533054 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.777764082 CET4971580192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.779202938 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.897191048 CET8049715167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.898448944 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:19.898566008 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:19.898974895 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:20.019660950 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139556885 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139596939 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139638901 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:21.139748096 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:21.157259941 CET4972280192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:21.276712894 CET8049722167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:26.160058022 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.279346943 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:26.279480934 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.279794931 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:26.401876926 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.468954086 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.468986034 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.469058037 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:27.469275951 CET4973980192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:27.470248938 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.588727951 CET8049739172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:27.589598894 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:27.589725018 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.589978933 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.709287882 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:27.713669062 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:27.832911968 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824376106 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824450016 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824465990 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.824501038 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.824537039 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.824805021 CET4974080192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.826442957 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.944211960 CET8049740167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.945799112 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:28.945935965 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:28.946234941 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:29.065547943 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188648939 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188750029 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188760996 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:30.188834906 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:30.189090967 CET4974680192.168.2.5167.99.38.229
              Dec 11, 2024 11:29:30.308557034 CET8049746167.99.38.229192.168.2.5
              Dec 11, 2024 11:29:35.191498995 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.310954094 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:35.313772917 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.314178944 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:35.434171915 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.414221048 CET8049762172.67.74.152192.168.2.5
              Dec 11, 2024 11:29:36.414546013 CET4976280192.168.2.5172.67.74.152
              Dec 11, 2024 11:29:36.415210009 CET