Windows
Analysis Report
Vidneafhring.exe
Overview
General Information
Detection
GuLoader
Score: | 80 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious PE digital signature
Joe Sandbox ML detected suspicious sample
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
JA3 SSL client fingerprint seen in connection with other malware
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Classification
- System is w10x64
Vidneafhring.exe (PID: 6932 cmdline:
"C:\Users\ user\Deskt op\Vidneaf hring.exe" MD5: 24C3013EE542B77EB416866A4DCDF66E) Vidneafhring.exe (PID: 6404 cmdline:
"C:\Users\ user\Deskt op\Vidneaf hring.exe" MD5: 24C3013EE542B77EB416866A4DCDF66E)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-19T20:37:23.879546+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.8 | 49976 | 142.250.185.78 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00405A19 | |
Source: | Code function: | 0_2_004027CF | |
Source: | Code function: | 0_2_004065EA |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004054D9 |
Source: | Process Stats: |
Source: | Code function: | 0_2_004033A2 |
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_00406973 | |
Source: | Code function: | 0_2_70131B28 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004033A2 |
Source: | Code function: | 0_2_00404789 |
Source: | Code function: | 0_2_00402198 |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | Code function: | 0_2_70131B28 |
Persistence and Installation Behavior |
---|
Source: | Joe Sandbox AI: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Code function: | 0_2_00405A19 | |
Source: | Code function: | 0_2_004027CF | |
Source: | Code function: | 0_2_004065EA |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-5075 | ||
Source: | API call chain: | graph_0-4925 |
Source: | Code function: | 0_2_70131B28 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004033A2 |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 Access Token Manipulation | 11 Masquerading | OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Access Token Manipulation | LSASS Memory | 3 File and Directory Discovery | Remote Desktop Protocol | 1 Clipboard Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 11 Process Injection | Security Account Manager | 23 System Information Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | System Network Configuration Discovery | Distributed Component Object Model | Input Capture | 13 Application Layer Protocol | Traffic Duplication | Data Destruction |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | Virustotal | Browse | ||
47% | ReversingLabs | Win32.Trojan.NSISInject | ||
100% | Avira | HEUR/AGEN.1331786 |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
1% | Virustotal | Browse | ||
0% | ReversingLabs | |||
1% | Virustotal | Browse |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
drive.google.com | 142.250.185.78 | true | false | high | |
drive.usercontent.google.com | 216.58.206.33 | true | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.78 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
216.58.206.33 | drive.usercontent.google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1619374 |
Start date and time: | 2025-02-19 20:34:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Vidneafhring.exe |
Detection: | MAL |
Classification: | mal80.troj.evad.winEXE@3/27@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.60
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
⊘No simulations
⊘No context
⊘No context
⊘No context
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | BruteRatel, Latrodectus | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Discord Token Stealer, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsi680F.tmp\System.dll | Get hash | malicious | Remcos, GuLoader | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | GuLoader, Remcos | Browse | |||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | GuLoader, Remcos | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5632 |
Entropy (8bit): | 4.004531061976898 |
Encrypted: | false |
SSDEEP: | 48:im1gEhmNd2MPUptxENJ5imMOBAZqMTBCpYwvNHZzUJvR0J56of5dwe:F1qdBGE75LBAZqIFeZUR0zPd |
MD5: | 2A0F58BAA9F48961707195D3D9AB8D0A |
SHA1: | ABB640F58BD2A3FC50CD130BD960015DF7A2A345 |
SHA-256: | A9520CE3BCFA4CFB7D9BE3D317BDB3068246B38292E6D291A55F1B04A158998E |
SHA-512: | 273356A565978FF58D223E4D84DE85D257838B1C37AE33054DE76401AC935FD26F54213424AD8164BAE2C4F9D9F2D61CBDD24BBAAD453DA938E0DCA26B98130A |
Malicious: | false |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 5.744994954995265 |
Encrypted: | false |
SSDEEP: | 192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C |
MD5: | 12B140583E3273EE1F65016BECEA58C4 |
SHA1: | 92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA |
SHA-256: | 014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042 |
SHA-512: | 49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52 |
Entropy (8bit): | 4.056517728614861 |
Encrypted: | false |
SSDEEP: | 3:SvwjWgl3YTx1/RY:SvwxhYtxRY |
MD5: | A25AF6D1B6AD22D095CA809221E17621 |
SHA1: | 012657818CD2EC992FEC89322303C152EA78C408 |
SHA-256: | 1A3ECAA8FA89B83F3D0D1358F8DF860A47A96CAFE50B98E64AC4A02B377CEC92 |
SHA-512: | 1CB99896F29C234479AE7E74AE89FFF742D67CE361CAF43E6651BCFA43F0A576ED67F73C713600DAF0292DF6FE0E9D523DB790EAA9A6E0176B5FA82CD3D0C669 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3453179 |
Entropy (8bit): | 0.15857142308632322 |
Encrypted: | false |
SSDEEP: | 6144:qTxjAosoALjwTrsw0MjZ4TFDOMcuMe9kzrICIvXnaViZKQLnhyk+gGjwE4C/f19M:N |
MD5: | 2F76E09C93024010C743C80919807D12 |
SHA1: | 667DD795164286A3A44109FD768FCFF3E8EECACC |
SHA-256: | 810852AE8F83A0621768A0B209B435769714DC3A9AA8FAAA3105C2D57D2F9E1A |
SHA-512: | 02DA606B612C4424E413FB9620D60DD0D7213457F87C94167BDE6B5BB1FC45F34D7F888203B07BE177D9770BEACA3593BF603B839F7D8B961127CA85A44E5B4C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 233 |
Entropy (8bit): | 4.730197950244597 |
Encrypted: | false |
SSDEEP: | 6:g8JtRAWX4hkvTlOELIuYkfuEpxxLTEzK/:g2RAIROzw3vEe/ |
MD5: | 6C5D26287F8DDAF90C4C097CA21C1AB7 |
SHA1: | 0CE8AE7E61BC33EF38E3D89762A44BCB413C5737 |
SHA-256: | 53F0F3532FF26020B2AF34A95EF5C3D7CAD6B542D008FC69D8C10B56EC35A1CC |
SHA-512: | C50C8685D19316AE72E55222237781166D0BD10BFFFE9428CE03916F7FF840DED7699CE30755EABA2C6364BD8451426E92DBDE312DC54B0B700D740D9105981A |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4929581 |
Entropy (8bit): | 0.1577105335660177 |
Encrypted: | false |
SSDEEP: | 768:8LbaiaRA4/BYwzWgNmuJRcYCeFfDOd4huj8ZfT4KI8ZxF9qhr4kmGQFzlkN4Ov2b:tSSGICw |
MD5: | 72155C2E08677E5E2F815D82DCABF3A1 |
SHA1: | AAEF661D34828CD8FC3AF5B5C8D705B445641142 |
SHA-256: | F8279419E0DB7BBA7B0ADFDE76C76D12FBC9735B8BCD2BDA8FAA468C46C4B770 |
SHA-512: | BFB19E6B121EC73646E63127B5B7E9526FE7BA6617942D824D26EBA0B23215B0C086FC3C59B154EAC28893ED376AF48051026B42E67256CBE08322D7F52DA734 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5601804 |
Entropy (8bit): | 0.1583962619889294 |
Encrypted: | false |
SSDEEP: | 6144:oS02xTGVOTm6m54Vvmrz697FV6eDOBukVlG08+U37ZN+kKGT5ux3PFcUvHjfFdVT:uH |
MD5: | 6485D63A37739A5B885AF76194BE135B |
SHA1: | B841E8C1BF75D2B94D85224486746C0895829B76 |
SHA-256: | 3175BD8FE96E7750A8588F3A121C2D6762C69822B7D3C0742D66BD0B45D0FFE4 |
SHA-512: | 039EE072EF30123F5BF14A35BC3125C5B63FAEE9B14676E860D11665E8E9AEF1ECE18F11FACC8327BC5FFBC90BF05728A2EEFFAA44048CD04E1E838F7CD1BED0 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 381 |
Entropy (8bit): | 4.484832340474549 |
Encrypted: | false |
SSDEEP: | 6:UXn1VrALsDX1jEBhm7ca0wAJvg2lEdRdA80+XKHqLC9OrWRKX+xFESXmLLe7ntQt:OzEAXPQa4JvflV8DFJ60+xFESXrmt |
MD5: | 5444F699984B26877992CAA91DB2F82B |
SHA1: | D716AAC01E90151F18224EEF7018ED5A18789E5A |
SHA-256: | F8E30DB42A72B71B39F714C85F651AEA4A2D39BAEE13875694116EABD7DDE876 |
SHA-512: | E3FAFEBFFD0B1222B9E9D1CBCAE2B144F7B11CAFD7F7B54C115646154CF82DF9EB1F0454FF615BA097E46C09B3CB6D8B9ABF3AC9E9143A475A78143E76DEBBCA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 555 |
Entropy (8bit): | 4.511299220024637 |
Encrypted: | false |
SSDEEP: | 12:4wCwG0hmBnSqCJAcJJXn9qPX6XAS3SbB6KSc4w/XqLFvmNsEpSan:4wCwJmpY1JJX9qv6QSibB6BLw/XwOOEz |
MD5: | 5393141540118A4E5CD5CB8EBD109DED |
SHA1: | 9D527D4FCE4FD1796CB4D8539EF47FD0265FE338 |
SHA-256: | DA1EF2F8E10CC82FAC62BC0B1C184306029355273E45E8B6D2E5D3FAC5D2B9BE |
SHA-512: | 092F03959B1E2E3AEF833E80BBCF54FAF2BE4CE75351A786359B8C7BD3F32B5857537955C7697DAD69025513116A3A4C684BA76FFE3E5D81183ACC89698C429F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34352 |
Entropy (8bit): | 7.906381757574188 |
Encrypted: | false |
SSDEEP: | 768:Tys5vhCuQxrafv/zCRDShv0QyelqQ1ciW+rZd/YWVUO+:Tf5vhClRGnzCpSQjQ1cmzYCUO+ |
MD5: | DD091D6E27385B74E6CDD29F09607F31 |
SHA1: | 5B116B48CDB63E281866CFC1A0EE01A1F73836BF |
SHA-256: | B5EDD6D73DB7877A6436D39FAFDE9091353325F0F049F134A55B82276D3449F5 |
SHA-512: | FA5BF4AFCD5F18837484596714890F1C51176ABE24265364C1085221F164AD266B30F0C75F719D26B2B57AF01DFBE2D6AAF2A9DA9C994E2B23B9A1A51CF2B946 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 29879 |
Entropy (8bit): | 7.939425994301059 |
Encrypted: | false |
SSDEEP: | 768:vFEDKXUnmzYPllKkDXVu3OVxPMvegBpTpuCuY9rU6OaLgKLzUm:vFEDfmKbKkPpMvTBV8CN9rU6OWhzUm |
MD5: | FEC0E45DED9107748AEA0235CC50B742 |
SHA1: | F7835A9CAA0C85131245CFFDCA0A536D2C32A5F6 |
SHA-256: | 0DCFB472B62667EA78313941010AB67C6FFFFC29CBFFCAF8B79F34BD6A573818 |
SHA-512: | C739BF0258D16EA5100397E5938E6CC8CCDF2A937C5064C78DDEEE7F06896BF0457FF67B3A1688FFA4DBBA322A2458822C9D291FB0F9C95B4FB0A75D8639B6CF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1885 |
Entropy (8bit): | 7.74026550868548 |
Encrypted: | false |
SSDEEP: | 48:D9YMSuERAT+LeHME4qyOhIeKtMQ+3up+BCVlun2:Rh1EpLeHJ4oSeKtMQ+3up+BoV |
MD5: | BA815644FC779A7356D1E1DB2B401606 |
SHA1: | 52FC4E913B47D8D634387EEDEDFD79F15E70AF1A |
SHA-256: | 47B22444C66B3E0B1D31A5ED615606DA1444843EDE3803188A0933BF714BA7E3 |
SHA-512: | F204A172003E5F611F3232FE3BBBDF7EBE1DC9D53BAEC0C49AE985E7988E8E41A1CE4FA4221ECF423EC01A7A019BD3DF915A07C7A0A2BCAB76A2F54BDD92AE17 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 414 |
Entropy (8bit): | 4.715436058124769 |
Encrypted: | false |
SSDEEP: | 12:lcZTWS2gTtpMWJFabfTixSy1wz2Crwiqkc5BWBq5:qZWgnJETISMoNqx5B8q5 |
MD5: | 19D0FB8D47F7EE254EFBF0F421F855AC |
SHA1: | 5D40EF663A52E1022E3B26490AB4168B82BFB315 |
SHA-256: | 9B8A4DC8A529B2FF41FDC0DE9BD0A87B646C51F1C42DEDE6B72768671B6AF6D6 |
SHA-512: | B4AA49EA4C8917E4DB5E74BB414D7B289D4047C58274E8F2B58B3C7EF85108CCADC1F40DFD4FC9AA13086A788D2D40F8393CDAA86F894F5D95AE8DD2CC46848D |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25726 |
Entropy (8bit): | 7.947116657585298 |
Encrypted: | false |
SSDEEP: | 768:+wp/NvLkOOwvBJiW+I3EXnm9nF3qHFnumv9XIQa:+wTvEwvyWbE3mHaHFnLv9XIQa |
MD5: | BB4FFDD0FAE50A9147FC43AC577594EB |
SHA1: | 6404E43F3CAD8AAE36D67150FD1380BCD3ACB651 |
SHA-256: | 698D767163EA54CA837B5340E47FEA921E8EE3614315E5CC7075F4C72AE3F3A7 |
SHA-512: | 8A3B2F84F49229022956E67283F6D300FED0967DAA8E6B3FE95D641ACD5F12DF84551ABEE7F5B1195ADBBB8B6B61EA33C9796CD5FF4296B093739527E886079F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 218 |
Entropy (8bit): | 4.261577867661297 |
Encrypted: | false |
SSDEEP: | 3:LWV1WHWF6gG6rGynQ+VLVqAWCxdNMKAYqJAmxMW6GSxTEkdBAHZQLmN+fUGmeMI7:CbQ+V4CT+7xMW6GSxIkd25QY+fvMoloa |
MD5: | 4CD2544CB38F9D2453BB677394327CA7 |
SHA1: | 7CB7F58E89F13170AF526971F5529B440CD0D514 |
SHA-256: | 5EBFEAC29CD7D166FD0B5C4F7931AF51A0F012E52E7FDF1D5D04F9E54237438E |
SHA-512: | 1AF154FF626DC9960C1B28C44E6F8A5A249855D67264AB8C5CC4456E6122247FEFE791DABA3086D4E101B93B2AA74A6F821B4CAFC7BC7F95D022A917ECBC4FBE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 33741 |
Entropy (8bit): | 7.846669864988681 |
Encrypted: | false |
SSDEEP: | 768:kKpXGIsUFVmQfg8K378bdRn76Yjk9jF67JxlIw3AcG:kduPI8Kr4ReYjk9jFwxldwD |
MD5: | 7F9B37D3292AEA77F64EE9B2D333FE37 |
SHA1: | 774DDA75B2635A6DB58013F4361E538D2DE00B87 |
SHA-256: | 3AF6B40004F17C0425388FE4653E4EFBAC19ECDF6C2D07026880F0A0C27D3FFF |
SHA-512: | 25A7330A1CBCBC27811244FA10ADBDCD69CDE945021BCFA12D776AC0C7269E12F18C1048863FF53149014376BFD89B117ED1D4BD9312E07D6331F9CB5B6D24A8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 172 |
Entropy (8bit): | 4.990661037977351 |
Encrypted: | false |
SSDEEP: | 3:rzGHsttJqJQMzQOCx1EOdIIAZRsyoM8QdzM4M+nMdu3rigFFK7yvB6/aE8W1n:6sttJ5MMOCIXIfyMYMduWw07QEV |
MD5: | 4735FE9ECADEF5CC071120B108394AA9 |
SHA1: | 3A508241189EA743AF81BC7F7FFDB0F56A98C379 |
SHA-256: | D10A5227004DD1B9DEC6FB061B476876CD27F75EB28276358D7767E28E577D96 |
SHA-512: | 04BD0C1377D64631C7A46354EE42EC5F78D30981B39585E4864AE801F09518A3BB381C7763A6E1A83B1155C275BCCB10A563A180FDC0FE452A03768B4697D599 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 315 |
Entropy (8bit): | 4.424678560987089 |
Encrypted: | false |
SSDEEP: | 6:28vAX+6ApYEBalRCVzhBnZg/gf6KFErpL4lEQ44K2tpeKLVmOk8:4aBmo1Bn64f6KFslcEQHK2veWgOk8 |
MD5: | CD067E892C47D3A961084A6E1239C4E9 |
SHA1: | 9031D91802D302ED770AF10974D0FF62F3CD8526 |
SHA-256: | 2FA371485418FF2048CA084820F5085B6F1DC3E70EC3A334389996049DFDA9B7 |
SHA-512: | 985FFB204A06E94AF149E9F7BB43AE178780F6AEA0E8DC88DCF25E672824A3925354E53D10604597AF82808BE265564E300C53DCA3D997485740BCF94C392C60 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 362 |
Entropy (8bit): | 4.874033061382761 |
Encrypted: | false |
SSDEEP: | 6:q4zVxvXO/PE0j8covB/g0OKAtMVXZqn64XDP42vRszyN4zVdJRGMMUZe32rNb:5znvXF9YUXO6R1Hw32rNb |
MD5: | D77C4985E50230F41BC11A25AE8F8D6A |
SHA1: | 2C969DA9DCA95FBF9CCF3B5C6F4450F1C59EA7F7 |
SHA-256: | 81CB49F387B8B355F12C75F84B778202EF95EC3D644283BEBDD6747169DBCAC0 |
SHA-512: | 305FF9A075CE05E81AFAF8CB00D5ADE3266D9F6E90EBC8A54F1C7993DB6CAA11E81C80C8F5ADEE56D088D928DCEC99472924045534DC43F8FF39309AC2A5CEBE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 228 |
Entropy (8bit): | 4.337776203962119 |
Encrypted: | false |
SSDEEP: | 6:yRIwIOdNwuDmDWuP+bqnuoaJCNPBoug2Sy1roH:yFrD8WuP+Onuoao+y18H |
MD5: | 8862F782BA053275F8DCA35DA5B39227 |
SHA1: | 99066933FB52F539EB3EC66522502B32460EEDFB |
SHA-256: | 4D6A2F4CD09A5A760428A3F75DBAB4BE6B3A2B31F95423C29D63622608834355 |
SHA-512: | 65B66B982DE441D1D7A59B24860F8E820BE527CBB5695A8FE219FFCA3779BEC97A012ABFA55A0AEDB885F8711C4E1ACDCFF4CD8DB89330DDD0267AC96151BF0A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 313751 |
Entropy (8bit): | 0.16139965289622307 |
Encrypted: | false |
SSDEEP: | 384:e3aTNYcc9tRiLFxwaq6VKwgCQc6JNj2rQQvwPGy0zZcDARanpVQjaFt:6RcQRKGMeTJP+9jRWVHn |
MD5: | 984CF793FB7C950DA9EA7D029CE159DD |
SHA1: | ED25BEE1EBF42C74B966CD3D6BDD103F243C0D03 |
SHA-256: | 1D91942CCCC6B46158A2E1882D23BB61AC2DD8492C1CC97B919A99DBE924FEB2 |
SHA-512: | C9CC6C5D46002D6DB8796E86F992BF3814F83F23BF916218588402B7D5B85807A5BAFE17AB116CFD11A3C32C750CCABBC9A29EBF7C85590F89A7163878EB3385 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 443 |
Entropy (8bit): | 4.651338777405692 |
Encrypted: | false |
SSDEEP: | 12:8aWRbVGq5MMeuKHqanIKV0fKrqZ6ZKHAX0ZOSglZIfJv:8aWt9eWKHqaIKVFeZ6wSZSmSJv |
MD5: | C691C80C524F6A0B0C43125E35E87D38 |
SHA1: | BBFA2EBF564C7B948C87842453E7C4B7C0EF7FF7 |
SHA-256: | 122FECF6B35E9D38025B9515F4163C0642703B92F3D896E023BF5E53DBFA3F0B |
SHA-512: | 95B5A1155E55CBC2F1992737FE8B0CB0F2234181579609AB25D55D58A55A86DBAA19C245B9B141DF1C6ACD8E7581DBB58ABC8F7854E2F534A8ACA3497C24E1A3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 135 |
Entropy (8bit): | 4.653564654383033 |
Encrypted: | false |
SSDEEP: | 3:rBnpMow9efvbja+VrTIOOqAwALxTjJN1AfOCoJjv:ln89EzAwALlFN1qoJjv |
MD5: | F1E1041D6AB03B11975DB53031AAD39A |
SHA1: | 0BBEDE99983D397B7FC7EA04ECEB249C4F4A060D |
SHA-256: | D27C02D902A091740F3E04763AC162E9C725B6CB03E7B35041B6CA96A3A42CA6 |
SHA-512: | C6662CEEFD985FC595332523E38E3FDA480F52CA2EC918C7A930A5C43DBB8147CEE3DAD1ED37937BB19BCB4FE6672207DEB0A60FCDE5C3F8497229BD8861DCE2 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 746799 |
Entropy (8bit): | 0.15838215002860886 |
Encrypted: | false |
SSDEEP: | 384:QxCrLK2s5ET9FRXUUahYDJ8a2guojFD1oqpovgeujLAAYzToHrCZAqTe2iUQuQJt:DrmEqYDb3TJeRHmxW19Q0c |
MD5: | 1EE4DDAB4B0749BD0C6BE777D87BDBCA |
SHA1: | E53E9F763DC7607637E88F9FAC8478FDFEF1D4A1 |
SHA-256: | B93831D2CFCB4ECA4D8886BBCE1BCFD158C058A470877D45D6656AA8D0E6F0E6 |
SHA-512: | 99C3D42EB5A160852C40E7CED0FD545B44566E77C0580C16068E879B9C4663142641713DF05E47350523CDF3EF3E148A51E371D5075B106EA79070F1142463F8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10450 |
Entropy (8bit): | 7.943134321561137 |
Encrypted: | false |
SSDEEP: | 192:L9Zg6bsBqfyTYk0UcoEvVB7Kql66B4SchRAGzIGweerPAo:RZgH/moOb7Dl6w1cGGEGweSf |
MD5: | 234EE92065741A1CBDC30B508F278385 |
SHA1: | F50EE7A8AADBF3AD63E060517CB304B816906AB7 |
SHA-256: | B6B8BD44069CC9922BFA4FF3BF396601134AED59F24818C161779FCEF5741248 |
SHA-512: | 91F1C788157A597ADBDF9D0040EFBBAD7E37DDDCA3EC976C688C157176CB341FBF287DECACD4891FF0CC75E8AE9530042A694A9E81A937074C5C8E87A16051E8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 315063 |
Entropy (8bit): | 7.618238717543513 |
Encrypted: | false |
SSDEEP: | 6144:fEEHPggAO0FgvKHI/X64aasHuFMqcfo7bjm+4IP4tmQtrMygc2yZOp/oGYHgwQ9s:8EogAO0+yHYX6RaslqrzTuKxJyVajb6D |
MD5: | E04B0FADF826EF161A82B6AFABB1AAB6 |
SHA1: | 68AC1BCB542954A266705EC0FAF9974C13E8DD89 |
SHA-256: | C64928014CC5261D1AC1141647A94A0F624EE8B94ACA9E69644AC48B6D40541F |
SHA-512: | D0C6BEA1C25D0E807CEF192B0DBD90CB2AA101D81D700283EA549234F3DFFDE5559774174A25A352D8C7286F85139C76769224E3D006F58DF17D06AB602EAA37 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Vidneafhring.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111808 |
Entropy (8bit): | 2.666930376270207 |
Encrypted: | false |
SSDEEP: | 1536:bS/dod+B8rHMXd7CA6EKfRyTYuLgC/ylweDCboj5Wdr7u9DO+L3:Bd+1yXlpQnkT |
MD5: | A4EB53D0FAF8BDF73344ED65BF05C3F9 |
SHA1: | 4CD2A28CACC077962509B0C99271DD21DAC55214 |
SHA-256: | 06EB6DEFF6C33A89FAD1DDB778F53E70C51491B79EC7436015EAB2B1CE089F31 |
SHA-512: | E182331C104D1AFA106E53E21A3B24A2B12B6E142905B125111CED3C742285C882CEDBBD95EEE5266E005B99BBAE148FFA4450AFDB68BF1BF07F06FDDEF8D460 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.793226255795457 |
TrID: |
|
File name: | Vidneafhring.exe |
File size: | 1'105'632 bytes |
MD5: | 24c3013ee542b77eb416866a4dcdf66e |
SHA1: | 3d9ae42b17acc38c9f8425124ddc7fdc7fbde6c0 |
SHA256: | f13819d061e77a6a071a72f23e5daa4751db395492773280bd8e6285f0942e84 |
SHA512: | 0694c1b57c5e0fab3218719f195632ad6a519312f812056d05d87da7e455aae4fd2f370b1d4d057798f328f2f218ac396b9b496a71614139dbb5248242993b45 |
SSDEEP: | 24576:ZSafgu8S1aLLwWOroUmLDbZ7Jjl7WqDs3Ryo:ZlfguN1GLwWObSFhWquRh |
TLSH: | FC3522F2BB6468F5DB20873E346B9D5A56B1BE7138F41B963B9C3B1D2E72021430B145 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................d...........3............@ |
Icon Hash: | 0c39c3e64e31275c |
Entrypoint: | 0x4033a2 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x660843F1 [Sat Mar 30 16:55:13 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 671f2a1f8aee14d336bab98fea93d734 |
Signature Valid: | false |
Signature Issuer: | CN=Thoracostracan, E=Bespout@Multifunktionsko.Nom, O=Thoracostracan, L=Ebertshausen, OU="Unavailed Ekspansion ", S=Rheinland-Pfalz, C=DE |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | DD9EBB3BFB3B1156CC05C41B422AFC8C |
Thumbprint SHA-1: | 5DF35858C6DC9F7C2928970106D0C8497E7C90A8 |
Thumbprint SHA-256: | 02B623A8BC3698EA20679DF6198E7DBA9FB65FA99CB1E76BEA7EDB8A9CAA53C6 |
Serial: | 21F75D39F9361BA117D671CB49E2548FD7161DBB |
Instruction |
---|
push ebp |
mov ebp, esp |
sub esp, 00000224h |
push esi |
push edi |
xor edi, edi |
push 00008001h |
mov dword ptr [ebp-14h], edi |
mov dword ptr [ebp-0Ch], 0040A188h |
mov dword ptr [ebp-08h], edi |
mov byte ptr [ebp-04h], 00000020h |
call dword ptr [0040809Ch] |
mov esi, dword ptr [004080A0h] |
lea eax, dword ptr [ebp-000000C4h] |
push eax |
mov dword ptr [ebp-000000B0h], edi |
mov dword ptr [ebp-30h], edi |
mov dword ptr [ebp-2Ch], edi |
mov dword ptr [ebp-000000C4h], 0000009Ch |
call esi |
test eax, eax |
jne 00007FC418C1C4B1h |
lea eax, dword ptr [ebp-000000C4h] |
mov dword ptr [ebp-000000C4h], 00000094h |
push eax |
call esi |
cmp dword ptr [ebp-000000B4h], 02h |
jne 00007FC418C1C49Ch |
movsx cx, byte ptr [ebp-000000A3h] |
mov al, byte ptr [ebp-000000B0h] |
sub ecx, 30h |
sub al, 53h |
mov byte ptr [ebp-2Ah], 00000004h |
neg al |
sbb eax, eax |
not eax |
and eax, ecx |
mov word ptr [ebp-30h], ax |
cmp dword ptr [ebp-000000B4h], 02h |
jnc 00007FC418C1C494h |
and byte ptr [ebp-2Ah], 00000000h |
cmp byte ptr [ebp-000000AFh], 00000041h |
jl 00007FC418C1C483h |
movsx ax, byte ptr [ebp-000000AFh] |
sub eax, 40h |
mov word ptr [ebp-30h], ax |
jmp 00007FC418C1C476h |
mov word ptr [ebp-30h], di |
cmp dword ptr [ebp-000000C0h], 0Ah |
jnc 00007FC418C1C47Ah |
and word ptr [ebp+00000000h], 0000h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8430 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x49000 | 0x28570 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x10d028 | 0xeb8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x294 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x628a | 0x6400 | c4a2423b5674bfa0f784f8a541b55665 | False | 0.6612109375 | data | 6.390159547186612 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1234 | 0x1400 | d169790bd6b8e7821b264cddc934c496 | False | 0.4265625 | data | 5.032486821165516 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x1a438 | 0x400 | c8ea57e3d910ccbc8ce8b96488c46e9b | False | 0.6474609375 | data | 5.255785049642427 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x25000 | 0x24000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x49000 | 0x28570 | 0x28600 | 3a505d8e93dd6ec23ac8b59005e755df | False | 0.46901606037151705 | data | 5.340542879000782 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x49388 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.38218679758665564 |
RT_ICON | 0x59bb0 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.5192085347908345 |
RT_ICON | 0x63058 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.55318853974122 |
RT_ICON | 0x684e0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.5208431743032593 |
RT_ICON | 0x6c708 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.6046680497925311 |
RT_ICON | 0x6ecb0 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.6151500938086304 |
RT_ICON | 0x6fd58 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.6758196721311476 |
RT_ICON | 0x706e0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7349290780141844 |
RT_DIALOG | 0x70b48 | 0xb8 | data | English | United States | 0.6467391304347826 |
RT_DIALOG | 0x70c00 | 0x144 | data | English | United States | 0.5216049382716049 |
RT_DIALOG | 0x70d48 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x70e48 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x70f68 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x70fc8 | 0x76 | data | English | United States | 0.7457627118644068 |
RT_VERSION | 0x71040 | 0x29c | data | English | United States | 0.5104790419161677 |
RT_MANIFEST | 0x712e0 | 0x290 | XML 1.0 document, ASCII text, with very long lines (656), with no line terminators | English | United States | 0.5625 |
DLL | Import |
---|---|
ADVAPI32.dll | RegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA |
SHELL32.dll | SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA |
ole32.dll | OleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree |
COMCTL32.dll | ImageList_Destroy, ImageList_AddMasked, ImageList_Create |
USER32.dll | SetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu |
GDI32.dll | GetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor |
KERNEL32.dll | CreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA |
Description | Data |
---|---|
Comments | plainchant untakeableness demidome |
FileVersion | 3.4.0.0 |
LegalTrademarks | bunkerman antimere conchyliferous |
OriginalFilename | virkelighedssansen.exe |
ProductName | ceratorhine |
ProductVersion | 3.4.0.0 |
Translation | 0x0409 0x04b0 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-19T20:37:23.879546+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.8 | 49976 | 142.250.185.78 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2025 20:37:22.549381971 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:22.549443960 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:22.549519062 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:22.562808037 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:22.562825918 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.250965118 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.251126051 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.251729012 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.251890898 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.317497015 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.317560911 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.318526983 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.318607092 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.322078943 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.367328882 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.879637003 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.879867077 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.879868984 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.879945993 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.881475925 CET | 49976 | 443 | 192.168.2.8 | 142.250.185.78 |
Feb 19, 2025 20:37:23.881519079 CET | 443 | 49976 | 142.250.185.78 | 192.168.2.8 |
Feb 19, 2025 20:37:23.906352997 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:23.906399012 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:23.906483889 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:23.906805992 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:23.906822920 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:24.549833059 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:24.549937963 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:24.554984093 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:24.554997921 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:24.555305004 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:24.555377007 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:24.561418056 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:24.607336044 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.052685976 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.052835941 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.052939892 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.053011894 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.068757057 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.068840027 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.068857908 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.068908930 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.139480114 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.139576912 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.139620066 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.139679909 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.139695883 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.139748096 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.140734911 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.140795946 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.140810013 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.140866995 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.146985054 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.147056103 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.147075891 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.147129059 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.153274059 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.153343916 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.153352976 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.153438091 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.159810066 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.159921885 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.159939051 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.159991026 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.165834904 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.165896893 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.165921926 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.165973902 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.172086954 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.172153950 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.172178030 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.172240019 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.177123070 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.177186966 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.177217007 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.177284956 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.182996035 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.183051109 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.183516026 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.183572054 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.188740969 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.188803911 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.188817978 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.188873053 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.194190979 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.194253922 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.194277048 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.194334984 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.199781895 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.199841022 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.226108074 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226202965 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226242065 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226274014 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.226281881 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226295948 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.226296902 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226326942 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.226345062 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.226620913 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.226680994 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.227618933 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.227670908 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.231997967 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.232064009 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.232079983 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.232199907 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.238080978 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.238609076 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.238617897 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.238687038 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.243381023 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.243541956 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.243607044 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.243617058 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.244256973 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.249067068 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.250403881 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.250411034 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.250816107 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.254714966 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.254865885 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.254874945 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.254960060 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.260380030 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.260445118 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.260474920 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.260725021 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.266048908 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.268235922 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.268249989 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.268310070 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.271982908 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.272106886 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.272113085 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.272178888 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.277785063 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.277857065 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.277899027 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.278009892 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.282227039 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.282315016 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.282347918 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.284233093 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.286873102 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.286931992 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.286937952 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.286987066 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.291213989 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.291271925 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.291279078 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.291327000 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.295506001 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.295593977 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.295599937 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.295639992 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.299599886 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.299671888 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.299679041 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.299720049 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.299731016 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.299856901 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.299864054 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.299938917 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.303544998 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.303607941 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.303628922 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.303678036 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.307297945 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.307483912 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.307492971 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.307864904 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.311225891 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.311290979 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.311350107 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.311409950 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.315037012 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.315434933 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.315442085 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.315483093 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.318975925 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.319050074 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.319076061 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.319506884 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.321310997 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.321872950 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.321892977 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.322276115 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.323689938 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.323754072 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.323791981 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.323905945 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.325962067 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.327644110 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.327651978 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.328011036 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.328250885 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.328320980 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.328350067 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.328516006 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.330513000 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.330571890 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.330678940 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.330733061 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.332853079 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.332915068 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.332943916 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.333079100 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.335148096 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.335208893 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.335247993 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.335297108 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.337527990 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.338356018 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.338363886 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.338411093 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.339874029 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.339957952 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.339965105 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.340095043 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.342068911 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.342154026 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.342160940 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.342207909 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.344439983 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.344496965 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.344532013 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.344587088 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.346894026 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.346952915 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.346980095 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.347033978 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.349111080 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.351499081 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.351560116 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.351567984 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.352029085 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.352060080 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.352212906 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.353682995 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.353785038 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.353802919 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.354104042 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.356021881 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.356147051 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.356154919 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.356465101 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.358221054 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.358282089 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.358377934 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.359610081 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.360614061 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.362574100 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.362584114 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.362823963 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.362870932 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.362879038 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.362925053 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.365070105 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.365130901 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.365155935 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.365206957 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.367377043 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.367434025 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.367465973 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.367593050 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.369621038 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.371886015 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.371965885 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.371973991 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.372222900 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.372229099 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.372618914 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.374129057 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.374207020 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.374222040 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.374325037 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.376497984 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.376549006 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.376593113 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.376686096 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.378721952 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.378776073 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.378809929 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.378855944 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.380981922 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.383106947 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.383174896 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.383183002 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.384046078 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.384052038 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.384228945 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.385385036 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.385447979 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.385473967 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.385529041 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.387638092 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.387698889 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.387706041 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.387742043 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.390379906 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.390501976 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.390552998 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.390563011 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.391906977 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.391959906 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.391968012 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.392014980 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.393959045 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.394018888 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.394025087 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.394063950 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.396891117 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.396940947 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.396945000 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.396989107 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.397893906 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.397948027 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.397969961 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.398010969 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.401026964 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.404258966 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.404264927 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.404309034 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.404599905 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.404676914 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.404687881 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.405538082 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.405617952 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.405623913 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.407254934 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.407313108 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.407330036 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.407373905 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.409008980 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.410738945 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.410793066 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.410804033 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.412213087 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.412219048 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.412530899 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.412575960 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.412583113 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.414417982 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.414469004 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.414477110 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.414518118 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.416101933 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.416233063 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.416239977 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.416277885 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.417350054 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.417402029 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.417411089 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.417450905 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.419940948 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.420025110 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.420030117 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.420078039 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.420463085 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.422156096 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.422188997 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.422205925 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.422215939 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.422240019 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.422259092 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.423587084 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.424226046 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.424232006 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.424271107 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.425216913 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.425261021 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.425267935 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.425308943 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.426686049 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.426728964 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.426737070 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.426780939 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.431682110 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.431746960 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.431775093 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.431981087 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.431981087 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.432010889 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432064056 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.432414055 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432465076 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432517052 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.432523012 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432549953 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432595015 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.432600975 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.432640076 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.433577061 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.435012102 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.435039043 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.435076952 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.435084105 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.435106993 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.435122013 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.436314106 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.437594891 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.437621117 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.437655926 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.437664032 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.437678099 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.437706947 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.438875914 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.440104961 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.440133095 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.440181017 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.440196991 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.440207958 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.440238953 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.441555023 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.442965984 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.443002939 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.443135977 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.443141937 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.443186045 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.445219994 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.445276022 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.445333004 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.445338011 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.448221922 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.448225975 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.448431015 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.452974081 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.453133106 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Feb 19, 2025 20:37:27.453192949 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.453282118 CET | 49977 | 443 | 192.168.2.8 | 216.58.206.33 |
Feb 19, 2025 20:37:27.453299999 CET | 443 | 49977 | 216.58.206.33 | 192.168.2.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 19, 2025 20:37:22.537163019 CET | 59139 | 53 | 192.168.2.8 | 1.1.1.1 |
Feb 19, 2025 20:37:22.544636965 CET | 53 | 59139 | 1.1.1.1 | 192.168.2.8 |
Feb 19, 2025 20:37:23.896176100 CET | 62579 | 53 | 192.168.2.8 | 1.1.1.1 |
Feb 19, 2025 20:37:23.905282021 CET | 53 | 62579 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 19, 2025 20:37:22.537163019 CET | 192.168.2.8 | 1.1.1.1 | 0x5346 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 19, 2025 20:37:23.896176100 CET | 192.168.2.8 | 1.1.1.1 | 0x7dee | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 19, 2025 20:37:22.544636965 CET | 1.1.1.1 | 192.168.2.8 | 0x5346 | No error (0) | 142.250.185.78 | A (IP address) | IN (0x0001) | false | ||
Feb 19, 2025 20:37:23.905282021 CET | 1.1.1.1 | 192.168.2.8 | 0x7dee | No error (0) | 216.58.206.33 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49976 | 142.250.185.78 | 443 | 6404 | C:\Users\user\Desktop\Vidneafhring.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-19 19:37:23 UTC | 216 | OUT | |
2025-02-19 19:37:23 UTC | 1610 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49977 | 216.58.206.33 | 443 | 6404 | C:\Users\user\Desktop\Vidneafhring.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-19 19:37:24 UTC | 258 | OUT | |
2025-02-19 19:37:27 UTC | 5010 | IN | |
2025-02-19 19:37:27 UTC | 5010 | IN | |
2025-02-19 19:37:27 UTC | 4674 | IN | |
2025-02-19 19:37:27 UTC | 1326 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN | |
2025-02-19 19:37:27 UTC | 1390 | IN |
Click to jump to process
Click to jump to process
Click to jump to process
Target ID: | 0 |
Start time: | 14:35:27 |
Start date: | 19/02/2025 |
Path: | C:\Users\user\Desktop\Vidneafhring.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'105'632 bytes |
MD5 hash: | 24C3013EE542B77EB416866A4DCDF66E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 14:37:11 |
Start date: | 19/02/2025 |
Path: | C:\Users\user\Desktop\Vidneafhring.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'105'632 bytes |
MD5 hash: | 24C3013EE542B77EB416866A4DCDF66E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |