Windows
Analysis Report
Invoice Pending Payment.exe
Overview
General Information
Detection
GuLoader, Snake Keylogger
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious PE digital signature
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Classification
- System is w10x64
Invoice Pending Payment.exe (PID: 7332 cmdline:
"C:\Users\ user\Deskt op\Invoice Pending P ayment.exe " MD5: E70E71A31781B44F850A39693784CE74) powershell.exe (PID: 8140 cmdline:
"powershel l.exe" -wi ndowstyle minimized "$Bibrd=gc -Raw 'C:\ Users\user \AppData\R oaming\Kal kvrksarbej deren84\ch ego\revere nsens\Defm rkede\Cros sbeam.Dec1 22';$Antio dont=$Bibr d.SubStrin g(60335,3) ;.$Antiodo nt($Bibrd) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 8148 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) msiexec.exe (PID: 7524 cmdline:
"C:\Window s\SysWOW64 \msiexec.e xe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Username": "federico@extintoresdemir.com", "Password": "s46S2&4+", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security |
System Summary |
---|
Source: | Author: frack113: |
Source: | Author: frack113, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-24T17:24:18.091399+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49756 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:20.791092+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49777 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:22.016880+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49784 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:25.936989+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49815 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:27.221526+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49822 | 104.21.32.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-24T17:24:16.343542+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49741 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:17.452898+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49741 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:18.812277+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49759 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:20.202977+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49771 | 158.101.44.242 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-24T17:24:11.156612+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49737 | 142.250.186.46 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-24T17:24:28.167476+0100 | 1810007 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49828 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00405E6B | |
Source: | Code function: | 0_2_00405427 | |
Source: | Code function: | 0_2_00402647 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Code function: | 6_2_0253F2C0 | |
Source: | Code function: | 6_2_0253F4AC | |
Source: | Code function: | 6_2_0253F974 |
Networking |
---|
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00404F90 |
System Summary |
---|
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Code function: | 0_2_004030B8 |
Source: | Code function: | 0_2_00406141 | |
Source: | Code function: | 0_2_004047CF | |
Source: | Code function: | 6_2_0253D278 | |
Source: | Code function: | 6_2_02535370 | |
Source: | Code function: | 6_2_0253C146 | |
Source: | Code function: | 6_2_0253C738 | |
Source: | Code function: | 6_2_0253C468 | |
Source: | Code function: | 6_2_0253CA08 | |
Source: | Code function: | 6_2_0253E988 | |
Source: | Code function: | 6_2_0253CFAC | |
Source: | Code function: | 6_2_0253CCD8 | |
Source: | Code function: | 6_2_02537118 | |
Source: | Code function: | 6_2_02533AA1 | |
Source: | Code function: | 6_2_0253F974 | |
Source: | Code function: | 6_2_0253E97C | |
Source: | Code function: | 6_2_025329EC | |
Source: | Code function: | 6_2_02539DE0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00404293 |
Source: | Code function: | 0_2_00402036 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Data Obfuscation |
---|
Source: | File source: |
Source: | Anti Malware Scan Interface: | ||
Source: | Anti Malware Scan Interface: |
Source: | Code function: | 0_2_00405E92 |
Source: | Code function: | 1_2_04BBA5C1 | |
Source: | Code function: | 1_2_04BBEDEC | |
Source: | Code function: | 1_2_075BF639 | |
Source: | Code function: | 1_2_090E2B36 | |
Source: | Code function: | 1_2_090E025F |
Persistence and Installation Behavior |
---|
Source: | Joe Sandbox AI: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Code function: | 0_2_00405E6B | |
Source: | Code function: | 0_2_00405427 | |
Source: | Code function: | 0_2_00402647 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-3784 | ||
Source: | API call chain: | graph_0-3782 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 1_2_04A1F644 |
Source: | Code function: | 0_2_00405E92 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created / APC Queued / Resumed: | Jump to behavior |
Source: | Thread APC queued: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_100010D3 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00405B89 |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 2 Obfuscated Files or Information | 1 OS Credential Dumping | 3 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 311 Process Injection | 1 Software Packing | LSASS Memory | 14 System Information Discovery | Remote Desktop Protocol | 1 Data from Local System | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 11 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Masquerading | NTDS | 1 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 21 Virtualization/Sandbox Evasion | LSA Secrets | 21 Virtualization/Sandbox Evasion | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 311 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
24% | ReversingLabs | Win32.Trojan.Generic | ||
29% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs | |||
0% | Virustotal | Browse | ||
24% | ReversingLabs | Win32.Trojan.Generic | ||
29% | Virustotal | Browse |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
drive.google.com | 142.250.186.46 | true | false | high | |
drive.usercontent.google.com | 142.250.181.225 | true | false | high | |
reallyfreegeoip.org | 104.21.32.1 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high | |
checkip.dyndns.com | 158.101.44.242 | true | false | high | |
checkip.dyndns.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.186.46 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
142.250.181.225 | drive.usercontent.google.com | United States | 15169 | GOOGLEUS | false | |
104.21.32.1 | reallyfreegeoip.org | United States | 13335 | CLOUDFLARENETUS | false | |
158.101.44.242 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1622902 |
Start date and time: | 2025-02-24 17:22:24 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 28s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Invoice Pending Payment.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/15@5/5 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.253.72
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target msiexec.exe, PID 7524 because it is empty
- Execution Graph export aborted for target powershell.exe, PID 8140 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
11:23:20 | API Interceptor | |
11:24:16 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | GuLoader, Snake Keylogger | Browse | ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
104.21.32.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
158.101.44.242 | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | CryptOne, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MSIL Logger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
reallyfreegeoip.org | Get hash | malicious | MSIL Logger | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | CryptOne, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
checkip.dyndns.com | Get hash | malicious | MSIL Logger | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | CryptOne, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
api.telegram.org | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
ORACLE-BMC-31898US | Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | CryptOne, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | MSIL Logger | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | CryptOne, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | MSIL Logger | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Discord Token Stealer, GuLoader | Browse |
| |
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | CryptOne, MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nssAB11.tmp\nsExec.dll | Get hash | malicious | GuLoader, Snake Keylogger | Browse | ||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | modified |
Size (bytes): | 53158 |
Entropy (8bit): | 5.062687652912555 |
Encrypted: | false |
SSDEEP: | 1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF |
MD5: | 5D430F1344CE89737902AEC47C61C930 |
SHA1: | 0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB |
SHA-256: | 395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7 |
SHA-512: | DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6656 |
Entropy (8bit): | 5.028908901377071 |
Encrypted: | false |
SSDEEP: | 96:W7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgN738:Iygp3FcHi0xhYMR8dMqJVgN |
MD5: | 51E63A9C5D6D230EF1C421B2ECCD45DC |
SHA1: | C499CDAD5C613D71ED3F7E93360F1BBC5748C45D |
SHA-256: | CD8496A3802378391EC425DEC424A14F5D30E242F192EC4EB022D767F9A2480F |
SHA-512: | C23D713C3C834B3397C2A199490AED28F28D21F5781205C24DF5E1E32365985C8A55BE58F06979DF09222740FFA51F4DA764EBC3D912CD0C9D56AB6A33CAB522 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: | |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Brnaba.txt
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 357 |
Entropy (8bit): | 4.322293998459369 |
Encrypted: | false |
SSDEEP: | 6:PLZOEA1KHK56RTYPCl0ic0BTgcNDuARfKQfOwVBbvmF00aLdT4F+6/EB+OHeWhkb:P8HnPel/PMARfKnwVBbvmAhT4F+6TIkb |
MD5: | ACED15FD55D311D663ECC7B5F386B8E2 |
SHA1: | A7F36FD33206209CB0E5E39643EC8C6773D5ED3B |
SHA-256: | 16FDDF0D82AA1263194FE7C92459A6CF21DDDB1F1AE5A4E5A099865DB126614F |
SHA-512: | 7F27A00EDA246719E5F8FA521AC9499002DFDB36F6E661E13797C863520D84D14F43B5F717B176BBBEFCB4B62B671A14292C59DF288C55628CA08868BBCCFBD3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Crossbeam.Dec122
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60368 |
Entropy (8bit): | 5.280991252251336 |
Encrypted: | false |
SSDEEP: | 1536:IuWZnBGyJTf6U1uxBx174Nsp/0PjUt5hYlH:ULvTf/1uHNcj6XYt |
MD5: | 798E71F2FB7AECCBF532D4B9C7484B56 |
SHA1: | D22784524AC6412395F51A3FD3FE0CFBA04F034C |
SHA-256: | 1669D04C0289873AA79409AC3522A90CE116740F52C11EB8833AAF5C8908ACB8 |
SHA-512: | 29F868A51AC1B4C25A4A7D1FAD093E6FCCC3ADC762F8FA791C8E728AAF16A26CE0E43CDF45F955D0152D94CCFF514776426BFB9A088CEBF77EF9521A642606BF |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Invoice Pending Payment.exe 

Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 507280 |
Entropy (8bit): | 7.58580269013346 |
Encrypted: | false |
SSDEEP: | 12288:yQeEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2J/JSJFJ8JjJcJHJQJoXJSJAhwjJTJZx:cEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2p |
MD5: | E70E71A31781B44F850A39693784CE74 |
SHA1: | CE8CF2DC1B30D5D6870CC3D374C15E1005FDC879 |
SHA-256: | A02B56B4C74424B72AE21D4737E822653E68B9762E1AEB313D81BD45ABCE39E7 |
SHA-512: | 2A7994CEC6638F7FF523358E7DF0BFDDAD0F2ABAEF89E598455E9F0B7A44009E139AC9F9AFD7AC38377ED302727C5C75322327B8FABF0B450835CDBB5C52A9A8 |
Malicious: | true |
Antivirus: |
|
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Invoice Pending Payment.exe:Zone.Identifier 
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Unloveliest183.jpg
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7357 |
Entropy (8bit): | 7.91945978739656 |
Encrypted: | false |
SSDEEP: | 192:LqBD2cMKYD6M3QJxtEns0OU16nK3HXJ2UgU:eBDnM6MgDtEEUknqYUL |
MD5: | F32B2F6007A74312B5F0CB1AA5B26680 |
SHA1: | BC3DC7EB50EFA53CE2FC46A32C5F995048BD85B3 |
SHA-256: | 2CB79365771956854ACEAD63102B019737F5C99A5A10DA94D2969638CC23E825 |
SHA-512: | EBE3120E79D07F3D1D775940ADF00E099AFD6F3273D49C2D600FEE1ACE2C175C9E01CBE9EB3D83EF7D033F129C5D562983F19B1D7CD327763A92E9A246EB94F3 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\Yderredens102.Kan
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 338276 |
Entropy (8bit): | 7.671083634160716 |
Encrypted: | false |
SSDEEP: | 6144:WWxwim+hZhU4Cb/9U5usu4LX4Ev0P+sDBG6IzhV8ulhplMjNzxU9l:WWxrPhxY9su+IBGsDI9qEQxUH |
MD5: | A4DD91D5ACFA3D8154510A16A27792DF |
SHA1: | 7F797BEECC8609A7B617A7CCD6BA8A335D475A47 |
SHA-256: | 5AE90EE62220502C1041B177854398C94B9F42F6115CE6FCA120B7C0702C0286 |
SHA-512: | 8F119081CF9625F036AC4783A7D127D25E8BF82BC6FEBE804EDAC2D18B71B9E85AB2C26CB04AA1A28A47CC1D49BD0676D486FEA917CA872B7C2E43A6AF889C07 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\blinkenberg.txt
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 188 |
Entropy (8bit): | 4.482002609682535 |
Encrypted: | false |
SSDEEP: | 3:jNgLDK9OujIcBAVar8kQWgQQXTzMTBWAQ2qQJCTgLck/xLCmSoTKA9jsqdn:WEOnwfoOVm0tnNwTOdg295dn |
MD5: | 2B51E420AA9188A74DB9D853C1225B5C |
SHA1: | B1AA913BBE9C576F1C7917AE2E18F4F5C4B54164 |
SHA-256: | FA760065782306B4B9E082086166D25EADA402A3332C771C48F4EDE9D5DC7E53 |
SHA-512: | 574581B87211289CC809F0BF97E968E5BC070C95B20E92ADC4315404A3E632754291BBE3B3AF1894441855BD25C797FF52ADF968DC0A73F710F199017CAF37E6 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\fllesbrn.txt
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 279 |
Entropy (8bit): | 4.994626166298632 |
Encrypted: | false |
SSDEEP: | 6:2/r0IwOQPFeBmRaaBO/XJLgDj/GZowKblJBQVAL6Ab9xu+b1:2A9OQYYJO/XuGZjKJJiVu6AbT5R |
MD5: | 6620E9C5C35F1FEAAFC525A49FF31080 |
SHA1: | 969AB64F04BCDCAB9088F1F2FA6A8209DB33E8FD |
SHA-256: | FCD285BFF12244DA3CF356243BEACEB8DB8B2868320D371D1059408AD02A0CAA |
SHA-512: | A3238FD4843C3407CD07C014444F2557D7064F53A074F58BE97230A7CC7D81E0C7D09DD25B9110C5568466E2F9AA10EB11129ED143E07F63763EB5FE3DA75ED9 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Kalkvrksarbejderen84\chego\reverensens\Defmrkede\sensible.jpg
Download File
Process: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 32639 |
Entropy (8bit): | 7.9475019669336495 |
Encrypted: | false |
SSDEEP: | 768:6+UnjpGM4h/Q0kf7jWCXOi/vWYjc/Gv33xxMatfqxi/fftvoEP:6+UjpB4K0kjjWKOi/vWYjOUHXtfqAXvP |
MD5: | 86647E5BC7C82F155C5CB0EC05F40E9F |
SHA1: | E0946F26733AA05FCEAE067377622C083AF88C8D |
SHA-256: | 6D1974E15C49647F2BA907D7D233CB04D2F9D9C77CFB6B4255B577FE95D54B19 |
SHA-512: | 7C812D119382C9135195DDD18106FC6B465982D36C7815680C52DE2C0A40DC8E569FFBF32E87AF8BA10A71670A01CAB30D0D36CE49DB599473EC10CDACEFF992 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.58580269013346 |
TrID: |
|
File name: | Invoice Pending Payment.exe |
File size: | 507'280 bytes |
MD5: | e70e71a31781b44f850a39693784ce74 |
SHA1: | ce8cf2dc1b30d5d6870cc3d374c15e1005fdc879 |
SHA256: | a02b56b4c74424b72ae21d4737e822653e68b9762e1aeb313d81bd45abce39e7 |
SHA512: | 2a7994cec6638f7ff523358e7df0bfddad0f2abaef89e598455e9f0b7a44009e139ac9f9afd7ac38377ed302727c5c75322327b8fabf0b450835cdbb5c52a9a8 |
SSDEEP: | 12288:yQeEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2J/JSJFJ8JjJcJHJQJoXJSJAhwjJTJZx:cEJFJYJbJPeJyxJxWJiJfJcJWJSJaJ2p |
TLSH: | 33B4F1A37286E5E7F4560CF4CC299AF993A2ED01D9D85503F184BF2F387366245250AF |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....f.R.................\...........0.......p....@ |
Icon Hash: | 371f9d96cb0d1703 |
Entrypoint: | 0x4030b8 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x52BA66A9 [Wed Dec 25 05:01:29 2013 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | e160ef8e55bb9d162da4e266afd9eef3 |
Signature Valid: | false |
Signature Issuer: | CN=Breweries, E=Skrmblomstede@Tredjeprmier.Sh, O=Breweries, L=Somersworth, OU="Tyktarmsoperations Kaalhoved tilblivelsens ", S=New Hampshire, C=US |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 92807D7374421D79A823FA7ACA6FF4C6 |
Thumbprint SHA-1: | 05F5583BAAEA1B3C4E6C4B87EF108D1468F3E327 |
Thumbprint SHA-256: | E8C65A4CB80B655AEF4C0D07A3D407B6265C0EC80F62EE79AC5291A245D3AEA2 |
Serial: | 391A08F4CFA8FACE743EC806DF49200A45DD1E7D |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push ebp |
push esi |
xor ebx, ebx |
push edi |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409190h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407034h] |
push 00008001h |
call dword ptr [0040711Ch] |
push ebx |
call dword ptr [0040728Ch] |
push 00000008h |
mov dword ptr [00423778h], eax |
call 00007F9080ECD04Ah |
mov dword ptr [004236C4h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 0041EC80h |
call dword ptr [00407164h] |
push 00409180h |
push 00422EC0h |
call 00007F9080ECCCF4h |
call dword ptr [00407120h] |
mov ebp, 00429000h |
push eax |
push ebp |
call 00007F9080ECCCE2h |
push ebx |
call dword ptr [00407118h] |
cmp byte ptr [00429000h], 00000022h |
mov dword ptr [004236C0h], eax |
mov eax, ebp |
jne 00007F9080ECA2BCh |
mov byte ptr [esp+14h], 00000022h |
mov eax, 00429001h |
push dword ptr [esp+14h] |
push eax |
call 00007F9080ECC772h |
push eax |
call dword ptr [00407220h] |
mov dword ptr [esp+1Ch], eax |
jmp 00007F9080ECA375h |
cmp cl, 00000020h |
jne 00007F9080ECA2B8h |
inc eax |
cmp byte ptr [eax], 00000020h |
je 00007F9080ECA2ACh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x73a4 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x36000 | 0x18a50 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x7b610 | 0x780 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x298 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5a6a | 0x5c00 | 8781c451557a4626018483faabe438d0 | False | 0.6614724864130435 | data | 6.417713695663469 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x11ce | 0x1200 | 640f709ec19b4ed0455a4c64e5934d5e | False | 0.4520399305555556 | OpenPGP Secret Key | 5.23558258677739 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x1a7b8 | 0x400 | c9a433d4fe67308d6a5942cfb667cbe7 | False | 0.5986328125 | data | 4.862130355383113 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x24000 | 0x12000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x36000 | 0x18a50 | 0x18c00 | ae1da6d52c6b9db5a72bcee2295c6945 | False | 0.3393604008838384 | data | 4.6330392279203245 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x36448 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 0 | English | United States | 0.2523660238968414 |
RT_ICON | 0x46c70 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 0 | English | United States | 0.4220954356846473 |
RT_ICON | 0x49218 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 0 | English | United States | 0.49343339587242024 |
RT_ICON | 0x4a2c0 | 0xea8 | Device independent bitmap graphic, 48 x 96 x 8, image size 0 | English | United States | 0.5876865671641791 |
RT_ICON | 0x4b168 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 0 | English | United States | 0.5450819672131147 |
RT_ICON | 0x4baf0 | 0x8a8 | Device independent bitmap graphic, 32 x 64 x 8, image size 0 | English | United States | 0.7319494584837545 |
RT_ICON | 0x4c398 | 0x6c8 | Device independent bitmap graphic, 24 x 48 x 8, image size 0 | English | United States | 0.7811059907834101 |
RT_ICON | 0x4ca60 | 0x668 | Device independent bitmap graphic, 48 x 96 x 4, image size 0 | English | United States | 0.47804878048780486 |
RT_ICON | 0x4d0c8 | 0x568 | Device independent bitmap graphic, 16 x 32 x 8, image size 0 | English | United States | 0.7095375722543352 |
RT_ICON | 0x4d630 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 0 | English | United States | 0.6879432624113475 |
RT_ICON | 0x4da98 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 0 | English | United States | 0.5551075268817204 |
RT_ICON | 0x4dd80 | 0x1e8 | Device independent bitmap graphic, 24 x 48 x 4, image size 0 | English | United States | 0.6086065573770492 |
RT_ICON | 0x4df68 | 0x128 | Device independent bitmap graphic, 16 x 32 x 4, image size 0 | English | United States | 0.6993243243243243 |
RT_DIALOG | 0x4e090 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x4e190 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x4e2b0 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x4e378 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x4e3d8 | 0xbc | data | English | United States | 0.601063829787234 |
RT_VERSION | 0x4e498 | 0x2b0 | data | English | United States | 0.5058139534883721 |
RT_MANIFEST | 0x4e748 | 0x305 | XML 1.0 document, ASCII text, with very long lines (773), with no line terminators | English | United States | 0.5614489003880984 |
DLL | Import |
---|---|
KERNEL32.dll | GetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, Sleep, CloseHandle, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, SetErrorMode, GetCommandLineA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary |
USER32.dll | CreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA |
ADVAPI32.dll | RegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | CoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize |
VERSION.dll | GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA |
Description | Data |
---|---|
Comments | forskningslederen phon |
CompanyName | influenzaepidemiens doktoren |
FileVersion | 2.4.0.0 |
InternalName | nadvergst.exe |
LegalCopyright | bimahs weensier spildevandsledningernes |
LegalTrademarks | intensiveringernes |
Translation | 0x0409 0x04e4 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-02-24T17:24:11.156612+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49737 | 142.250.186.46 | 443 | TCP |
2025-02-24T17:24:16.343542+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49741 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:17.452898+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49741 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:18.091399+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49756 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:18.812277+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49759 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:20.202977+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49771 | 158.101.44.242 | 80 | TCP |
2025-02-24T17:24:20.791092+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49777 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:22.016880+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49784 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:25.936989+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49815 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:27.221526+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49822 | 104.21.32.1 | 443 | TCP |
2025-02-24T17:24:28.167476+0100 | 1810007 | Joe Security ANOMALY Telegram Send Message | 1 | 192.168.2.4 | 49828 | 149.154.167.220 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 24, 2025 17:24:10.080338955 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.080399990 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.080468893 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.138808966 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.138864994 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.781915903 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.782023907 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.782989025 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.783068895 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.846456051 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.846492052 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.847455978 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:10.847527981 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.850744009 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:10.891377926 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:11.156618118 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:11.159080029 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:11.159116030 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:11.159245968 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:11.159399033 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:11.159491062 CET | 443 | 49737 | 142.250.186.46 | 192.168.2.4 |
Feb 24, 2025 17:24:11.159770966 CET | 49737 | 443 | 192.168.2.4 | 142.250.186.46 |
Feb 24, 2025 17:24:11.375334024 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:11.375369072 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:11.375730038 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:11.380115986 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:11.380130053 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:12.031922102 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:12.032038927 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:12.036314011 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:12.036326885 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:12.036808014 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:12.036876917 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:12.037249088 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:12.079345942 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.650444984 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.650526047 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.651032925 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.651092052 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.665189981 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.665271997 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.665293932 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.665337086 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.738888979 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.738956928 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.739015102 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.739067078 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.739093065 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.739139080 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.739507914 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.739559889 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.739598989 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.739650011 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.746112108 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.746195078 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.746285915 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.746340990 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.752053022 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.752115011 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.752262115 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.752321959 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.758404016 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.758457899 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.758477926 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.758523941 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.765340090 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.765438080 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.765458107 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.765503883 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.770777941 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.770837069 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.770858049 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.770931959 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.776101112 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.776160002 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.776176929 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.776221991 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.781788111 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.781843901 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.781945944 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.782004118 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.787863016 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.787928104 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.787939072 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.788054943 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.793638945 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.793749094 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.793760061 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.793806076 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.799279928 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.799345970 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.828113079 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.828180075 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.828198910 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.828238010 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.828268051 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.828315973 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.828336954 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.828380108 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.828478098 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.828526974 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.829230070 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.829279900 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.829307079 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.829363108 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.832034111 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.832092047 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.832104921 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.832143068 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.837598085 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.837657928 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.837871075 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.837922096 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.843221903 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.843271971 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.843301058 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.843347073 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.843393087 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.843432903 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.848997116 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.849042892 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.849123955 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.849200010 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.854724884 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.854778051 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.854798079 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.854840994 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.860498905 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.860551119 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.860572100 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.860611916 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.865493059 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.865545988 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.865592957 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.865633965 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.872020006 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.872071981 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.872102022 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.872148991 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.877516031 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.877573967 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.877588987 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.877629042 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.882400990 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.882452011 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.882474899 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.882520914 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.887203932 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.887320995 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.887336016 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.887389898 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.891987085 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.892047882 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.892117977 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.892162085 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.895718098 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.895768881 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.895807981 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.895853043 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.899785042 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.899841070 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.899857044 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.899899006 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.899940968 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.899981022 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.903532028 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.903582096 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.903606892 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.903650999 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.908577919 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.908642054 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.908704042 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.908751965 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.911658049 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.911708117 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.911722898 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.911767960 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.915503025 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.915577888 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.915591955 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.915637970 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.919296026 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.919342041 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.919377089 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.919425964 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.921279907 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.921335936 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.921408892 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.921452045 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.923707008 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.923759937 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.923790932 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.923839092 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.925863981 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.925918102 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.925934076 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.925973892 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.928276062 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.928328037 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.928347111 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.928385973 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.930597067 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.930644035 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.930775881 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.930820942 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.932965994 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.933016062 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.933072090 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.933120012 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.935540915 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.935590029 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.935615063 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.935657024 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.937524080 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.937575102 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.937597036 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.937675953 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.939970016 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.940236092 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.940247059 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.940295935 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.942363977 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.942414999 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.942435980 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.942483902 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.944395065 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.944447041 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.944530010 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.944585085 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.947109938 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.947154045 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.947194099 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.947244883 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.949306011 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.949368000 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.949389935 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.949426889 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.951512098 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.951585054 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.951596022 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.951679945 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.953809023 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.953876972 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.953891039 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.953933001 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.955996037 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.956047058 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.956073046 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.956285954 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.958276987 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.958359003 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.958367109 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.958460093 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.960596085 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.960649014 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.960660934 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.960697889 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.963015079 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.963063955 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.963078022 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.963121891 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.965588093 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.965655088 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.965667963 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.965738058 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.967462063 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.967510939 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.967535019 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.967581034 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.971808910 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.971880913 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.971895933 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.971940994 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.973051071 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.973109961 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.973121881 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.973160028 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.975792885 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.975856066 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.975867033 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.975994110 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.976982117 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.977025032 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.977034092 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.977092028 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.981384039 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.981549025 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.981558084 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.981601954 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.985352039 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.985397100 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.985404968 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.985642910 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.991451979 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.993871927 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.993899107 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.993933916 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.993942022 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.993973017 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.993988991 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.998617887 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.998663902 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:14.998682976 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:14.998795986 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.000298977 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.000346899 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.000380993 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.000387907 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.000412941 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.000430107 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.001377106 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.001419067 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.001425982 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.001461029 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.001737118 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.001777887 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.001785040 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.001941919 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.002770901 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.002957106 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.002980947 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.003006935 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.003015041 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.003036022 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.003047943 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.003345013 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.003391981 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.003397942 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.003428936 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.005177021 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.005219936 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.005227089 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.005273104 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.006015062 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.006059885 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.006066084 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.006133080 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.007786036 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.008024931 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.008033037 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.008105993 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.009563923 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.009603977 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.009610891 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.009681940 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.011182070 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.011219025 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.011234999 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.011274099 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.012868881 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.012938976 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.012948990 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.012984991 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.014604092 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.014650106 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.014661074 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.015134096 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.016253948 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.016295910 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.016303062 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.016340017 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.017909050 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.017949104 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.017956018 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.018004894 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.019563913 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.019604921 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.019612074 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.019646883 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.020988941 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.021044970 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.021075964 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.021112919 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.022720098 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.022778034 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.022784948 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.022923946 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.024106979 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.024158955 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.024166107 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.024207115 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.025577068 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.025629044 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.025636911 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.025675058 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.027066946 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.027134895 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.027142048 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.027179003 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.028539896 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.028592110 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.028598070 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.028650999 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.029968023 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.030013084 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.030019045 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.030168056 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.031290054 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.031338930 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.031426907 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.031565905 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.031572104 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.031610012 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.032679081 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.032721996 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.032728910 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.032764912 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.034085989 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.034127951 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.034136057 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.034171104 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.035510063 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.035583019 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.035589933 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.035896063 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.036698103 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.036739111 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.036758900 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.036789894 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.038086891 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.038132906 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.038140059 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.038192034 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.039341927 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.039398909 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.039406061 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.039489031 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040633917 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.040718079 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040724039 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.040776968 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040782928 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.040801048 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.040838003 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040859938 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040877104 CET | 443 | 49738 | 142.250.181.225 | 192.168.2.4 |
Feb 24, 2025 17:24:15.040888071 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.040983915 CET | 49738 | 443 | 192.168.2.4 | 142.250.181.225 |
Feb 24, 2025 17:24:15.321161032 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:15.326195002 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:15.326271057 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:15.326503992 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:15.331474066 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:15.890733004 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:15.894089937 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:15.900527954 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:16.288749933 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:16.343542099 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:16.630728006 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:16.630737066 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:16.630882978 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:16.632287025 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:16.632292986 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.098627090 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.098846912 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.102473021 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.102484941 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.102838039 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.105824947 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.151335955 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.233416080 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.233561993 CET | 443 | 49751 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.233635902 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.238924980 CET | 49751 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.244546890 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:17.249705076 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:17.399765968 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:17.402410030 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.402446985 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.402510881 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.402842045 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.402857065 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.452898026 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:17.891189098 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:17.892946005 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:17.892961979 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:18.091423988 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:18.091504097 CET | 443 | 49756 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:18.091579914 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:18.095042944 CET | 49756 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:18.101295948 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:18.102313995 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:18.106605053 CET | 80 | 49741 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:18.106671095 CET | 49741 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:18.108438969 CET | 80 | 49759 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:18.108517885 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:18.108591080 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:18.114907026 CET | 80 | 49759 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:18.759287119 CET | 80 | 49759 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:18.760411024 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:18.760464907 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:18.760535955 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:18.760762930 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:18.760777950 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:18.812277079 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.407761097 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:19.409349918 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:19.409374952 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:19.567764044 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:19.567835093 CET | 443 | 49765 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:19.570591927 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:19.570591927 CET | 49765 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:19.571386099 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.572550058 CET | 49771 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.576901913 CET | 80 | 49759 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:19.576999903 CET | 49759 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.577898026 CET | 80 | 49771 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:19.577970982 CET | 49771 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.578031063 CET | 49771 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:19.583479881 CET | 80 | 49771 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:20.162252903 CET | 80 | 49771 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:20.167761087 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.167819023 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.167968988 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.168162107 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.168175936 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.202976942 CET | 49771 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:20.647562027 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.649065018 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.649111986 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.791110992 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.791203022 CET | 443 | 49777 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:20.791340113 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.791600943 CET | 49777 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:20.795650959 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:20.800697088 CET | 80 | 49781 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:20.800770044 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:20.800921917 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:20.805975914 CET | 80 | 49781 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:21.391242981 CET | 80 | 49781 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:21.392409086 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:21.392446995 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:21.392508984 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:21.392743111 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:21.392757893 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:21.437294006 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:21.859347105 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:21.860820055 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:21.860860109 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:22.016834974 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:22.016905069 CET | 443 | 49784 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:22.016979933 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:22.017349005 CET | 49784 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:22.020335913 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:22.021241903 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:22.025594950 CET | 80 | 49781 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:22.025676012 CET | 49781 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:22.026238918 CET | 80 | 49790 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:22.026310921 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:22.026403904 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:22.031433105 CET | 80 | 49790 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:22.616147995 CET | 80 | 49790 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:22.617336988 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:22.617388010 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:22.617470026 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:22.617691040 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:22.617707014 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:22.656580925 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.099921942 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:23.107997894 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:23.108020067 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:23.451812029 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:23.451883078 CET | 443 | 49796 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:23.451936007 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:23.452282906 CET | 49796 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:23.461250067 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.462423086 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.466499090 CET | 80 | 49790 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:23.466553926 CET | 49790 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.467479944 CET | 80 | 49802 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:23.467734098 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.467814922 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:23.472775936 CET | 80 | 49802 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:24.040095091 CET | 80 | 49802 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:24.041373014 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.041404963 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.041474104 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.041691065 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.041704893 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.093653917 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.537357092 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.540533066 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.540559053 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.704334974 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.704407930 CET | 443 | 49807 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:24.704485893 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.704893112 CET | 49807 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:24.707856894 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.708812952 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.713110924 CET | 80 | 49802 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:24.713922024 CET | 80 | 49809 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:24.713994980 CET | 49802 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.714026928 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.714117050 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:24.719074965 CET | 80 | 49809 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:25.317548990 CET | 80 | 49809 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:25.326129913 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:25.326189995 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.326276064 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:25.326541901 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:25.326553106 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.359189987 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:25.781851053 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.795372009 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:25.795388937 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.936950922 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.937006950 CET | 443 | 49815 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:25.937053919 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:25.937819004 CET | 49815 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:26.019867897 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:26.020970106 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:26.025274992 CET | 80 | 49809 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:26.025336981 CET | 49809 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:26.026011944 CET | 80 | 49820 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:26.026093006 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:26.026154995 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:26.031141996 CET | 80 | 49820 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:26.623707056 CET | 80 | 49820 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:26.624690056 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:26.624737024 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:26.624835968 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:26.625813961 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:26.625829935 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:26.671696901 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:27.081294060 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:27.083014965 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:27.083055019 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:27.221596956 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:27.221764088 CET | 443 | 49822 | 104.21.32.1 | 192.168.2.4 |
Feb 24, 2025 17:24:27.222004890 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:27.222297907 CET | 49822 | 443 | 192.168.2.4 | 104.21.32.1 |
Feb 24, 2025 17:24:27.260565996 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:27.265888929 CET | 80 | 49820 | 158.101.44.242 | 192.168.2.4 |
Feb 24, 2025 17:24:27.267982960 CET | 49820 | 80 | 192.168.2.4 | 158.101.44.242 |
Feb 24, 2025 17:24:27.270199060 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.270235062 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:27.270312071 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.270828009 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.270843983 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:27.919508934 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:27.919683933 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.922368050 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.922380924 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:27.923078060 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:27.924868107 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:27.971344948 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:28.167553902 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:28.167717934 CET | 443 | 49828 | 149.154.167.220 | 192.168.2.4 |
Feb 24, 2025 17:24:28.167809963 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:28.170475960 CET | 49828 | 443 | 192.168.2.4 | 149.154.167.220 |
Feb 24, 2025 17:24:35.070612907 CET | 49771 | 80 | 192.168.2.4 | 158.101.44.242 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 24, 2025 17:24:10.064089060 CET | 55552 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 24, 2025 17:24:10.071624994 CET | 53 | 55552 | 1.1.1.1 | 192.168.2.4 |
Feb 24, 2025 17:24:11.335117102 CET | 63367 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 24, 2025 17:24:11.343895912 CET | 53 | 63367 | 1.1.1.1 | 192.168.2.4 |
Feb 24, 2025 17:24:15.308897972 CET | 55741 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 24, 2025 17:24:15.317580938 CET | 53 | 55741 | 1.1.1.1 | 192.168.2.4 |
Feb 24, 2025 17:24:16.622246981 CET | 60106 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 24, 2025 17:24:16.630143881 CET | 53 | 60106 | 1.1.1.1 | 192.168.2.4 |
Feb 24, 2025 17:24:27.261194944 CET | 58918 | 53 | 192.168.2.4 | 1.1.1.1 |
Feb 24, 2025 17:24:27.269454002 CET | 53 | 58918 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Feb 24, 2025 17:24:10.064089060 CET | 192.168.2.4 | 1.1.1.1 | 0xc996 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 24, 2025 17:24:11.335117102 CET | 192.168.2.4 | 1.1.1.1 | 0xe69b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 24, 2025 17:24:15.308897972 CET | 192.168.2.4 | 1.1.1.1 | 0x2a9f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 24, 2025 17:24:16.622246981 CET | 192.168.2.4 | 1.1.1.1 | 0x43f2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Feb 24, 2025 17:24:27.261194944 CET | 192.168.2.4 | 1.1.1.1 | 0x2547 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Feb 24, 2025 17:24:10.071624994 CET | 1.1.1.1 | 192.168.2.4 | 0xc996 | No error (0) | 142.250.186.46 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:11.343895912 CET | 1.1.1.1 | 192.168.2.4 | 0xe69b | No error (0) | 142.250.181.225 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:15.317580938 CET | 1.1.1.1 | 192.168.2.4 | 0x2a9f | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:16.630143881 CET | 1.1.1.1 | 192.168.2.4 | 0x43f2 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Feb 24, 2025 17:24:27.269454002 CET | 1.1.1.1 | 192.168.2.4 | 0x2547 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49741 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:15.326503992 CET | 151 | OUT | |
Feb 24, 2025 17:24:15.890733004 CET | 321 | IN | |
Feb 24, 2025 17:24:15.894089937 CET | 127 | OUT | |
Feb 24, 2025 17:24:16.288749933 CET | 321 | IN | |
Feb 24, 2025 17:24:17.244546890 CET | 127 | OUT | |
Feb 24, 2025 17:24:17.399765968 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49759 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:18.108591080 CET | 127 | OUT | |
Feb 24, 2025 17:24:18.759287119 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49771 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:19.578031063 CET | 127 | OUT | |
Feb 24, 2025 17:24:20.162252903 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49781 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:20.800921917 CET | 151 | OUT | |
Feb 24, 2025 17:24:21.391242981 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49790 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:22.026403904 CET | 151 | OUT | |
Feb 24, 2025 17:24:22.616147995 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49802 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:23.467814922 CET | 151 | OUT | |
Feb 24, 2025 17:24:24.040095091 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49809 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:24.714117050 CET | 151 | OUT | |
Feb 24, 2025 17:24:25.317548990 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49820 | 158.101.44.242 | 80 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Feb 24, 2025 17:24:26.026154995 CET | 151 | OUT | |
Feb 24, 2025 17:24:26.623707056 CET | 321 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 142.250.186.46 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:10 UTC | 216 | OUT | |
2025-02-24 16:24:11 UTC | 1610 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 142.250.181.225 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:12 UTC | 258 | OUT | |
2025-02-24 16:24:14 UTC | 5021 | IN | |
2025-02-24 16:24:14 UTC | 5021 | IN | |
2025-02-24 16:24:14 UTC | 4657 | IN | |
2025-02-24 16:24:14 UTC | 1323 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN | |
2025-02-24 16:24:14 UTC | 1390 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49751 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:17 UTC | 85 | OUT | |
2025-02-24 16:24:17 UTC | 851 | IN | |
2025-02-24 16:24:17 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49756 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:17 UTC | 61 | OUT | |
2025-02-24 16:24:18 UTC | 853 | IN | |
2025-02-24 16:24:18 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49765 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:19 UTC | 85 | OUT | |
2025-02-24 16:24:19 UTC | 853 | IN | |
2025-02-24 16:24:19 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49777 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:20 UTC | 61 | OUT | |
2025-02-24 16:24:20 UTC | 861 | IN | |
2025-02-24 16:24:20 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49784 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:21 UTC | 61 | OUT | |
2025-02-24 16:24:22 UTC | 864 | IN | |
2025-02-24 16:24:22 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49796 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:23 UTC | 85 | OUT | |
2025-02-24 16:24:23 UTC | 859 | IN | |
2025-02-24 16:24:23 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49807 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:24 UTC | 85 | OUT | |
2025-02-24 16:24:24 UTC | 854 | IN | |
2025-02-24 16:24:24 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49815 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:25 UTC | 61 | OUT | |
2025-02-24 16:24:25 UTC | 859 | IN | |
2025-02-24 16:24:25 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49822 | 104.21.32.1 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:27 UTC | 61 | OUT | |
2025-02-24 16:24:27 UTC | 859 | IN | |
2025-02-24 16:24:27 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.4 | 49828 | 149.154.167.220 | 443 | 7524 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-02-24 16:24:27 UTC | 349 | OUT | |
2025-02-24 16:24:28 UTC | 344 | IN | |
2025-02-24 16:24:28 UTC | 55 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:23:17 |
Start date: | 24/02/2025 |
Path: | C:\Users\user\Desktop\Invoice Pending Payment.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 507'280 bytes |
MD5 hash: | E70E71A31781B44F850A39693784CE74 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:23:19 |
Start date: | 24/02/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x540000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 11:23:19 |
Start date: | 24/02/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 11:23:54 |
Start date: | 24/02/2025 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1b0000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |