Windows
Analysis Report
Collapse.exe
Overview
General Information
Detection
LummaC Stealer, PureLog Stealer
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to modify clipboard data
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Classification
- System is w10x64
Collapse.exe (PID: 4760 cmdline:
"C:\Users\ user\Deskt op\Collaps e.exe" MD5: 04EACC602D626EBA16224FDC15EF8AA5) Collapse.exe (PID: 7096 cmdline:
"C:\Users\ user\Deskt op\Collaps e.exe" MD5: 04EACC602D626EBA16224FDC15EF8AA5) WerFault.exe (PID: 4112 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 760 -s 924 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
{"C2 url": ["sdfwfsdf.icu", "explorebieology.run", "gadgethgfub.icu", "moderzysics.top", "techmindzs.live", "codxefusion.top", "phygcsforum.life", "techspherxe.top"], "Build id": "LPnhqo--qnhtzqcrazyg"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
Click to see the 1 entries |
⊘No Sigma rule has matched
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-05T14:57:19.214933+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49704 | 149.154.167.99 | 443 | TCP |
2025-03-05T14:57:20.010753+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:22.954670+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49712 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:24.255162+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49713 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:25.813429+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49714 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:28.170505+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:32.599119+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:33.820271+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:37.205618+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49728 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-05T14:57:22.449792+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:23.516026+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49712 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:39.257381+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49728 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-05T14:57:22.449792+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-05T14:57:27.573571+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49714 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 1_2_0041BF19 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 1_2_0044F0C0 | |
Source: | Code function: | 1_2_0044F1E0 | |
Source: | Code function: | 1_2_0044F1E0 | |
Source: | Code function: | 1_2_00413181 | |
Source: | Code function: | 1_2_00439DBD | |
Source: | Code function: | 1_2_004316C0 | |
Source: | Code function: | 1_2_00411F4E | |
Source: | Code function: | 1_2_0041AF10 | |
Source: | Code function: | 1_2_0041BF19 | |
Source: | Code function: | 1_2_00438033 | |
Source: | Code function: | 1_2_00438033 | |
Source: | Code function: | 1_2_0042A830 | |
Source: | Code function: | 1_2_0044B030 | |
Source: | Code function: | 1_2_00421089 | |
Source: | Code function: | 1_2_0044D0B0 | |
Source: | Code function: | 1_2_004329D3 | |
Source: | Code function: | 1_2_004329D3 | |
Source: | Code function: | 1_2_004019E0 | |
Source: | Code function: | 1_2_0044D9E0 | |
Source: | Code function: | 1_2_0044BA00 | |
Source: | Code function: | 1_2_0040A220 | |
Source: | Code function: | 1_2_0040A220 | |
Source: | Code function: | 1_2_0044FAE0 | |
Source: | Code function: | 1_2_0040CA90 | |
Source: | Code function: | 1_2_0040CA90 | |
Source: | Code function: | 1_2_0040CA90 | |
Source: | Code function: | 1_2_0044EAA2 | |
Source: | Code function: | 1_2_0044C35E | |
Source: | Code function: | 1_2_00433B12 | |
Source: | Code function: | 1_2_00448320 | |
Source: | Code function: | 1_2_0044AB30 | |
Source: | Code function: | 1_2_0040DBE2 | |
Source: | Code function: | 1_2_00435B80 | |
Source: | Code function: | 1_2_0041F3B0 | |
Source: | Code function: | 1_2_00420C28 | |
Source: | Code function: | 1_2_00421C30 | |
Source: | Code function: | 1_2_00421C30 | |
Source: | Code function: | 1_2_00421C30 | |
Source: | Code function: | 1_2_00421C30 | |
Source: | Code function: | 1_2_00423C35 | |
Source: | Code function: | 1_2_00433CE3 | |
Source: | Code function: | 1_2_00431CF0 | |
Source: | Code function: | 1_2_00431CF0 | |
Source: | Code function: | 1_2_00431CF0 | |
Source: | Code function: | 1_2_0041FD48 | |
Source: | Code function: | 1_2_0041FD48 | |
Source: | Code function: | 1_2_00425510 | |
Source: | Code function: | 1_2_00431D10 | |
Source: | Code function: | 1_2_0042FDC0 | |
Source: | Code function: | 1_2_0042FDC0 | |
Source: | Code function: | 1_2_0040DDB5 | |
Source: | Code function: | 1_2_0041AE40 | |
Source: | Code function: | 1_2_0044BE0B | |
Source: | Code function: | 1_2_0042AE30 | |
Source: | Code function: | 1_2_0042AE30 | |
Source: | Code function: | 1_2_004246A4 | |
Source: | Code function: | 1_2_00402750 | |
Source: | Code function: | 1_2_0041BF63 | |
Source: | Code function: | 1_2_00422F20 | |
Source: | Code function: | 1_2_00422F20 | |
Source: | Code function: | 1_2_0044AF20 | |
Source: | Code function: | 1_2_00410F30 | |
Source: | Code function: | 1_2_004437D0 | |
Source: | Code function: | 1_2_0044F780 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 1_2_00441800 |
Source: | Code function: | 1_2_03B41000 |
Source: | Code function: | 1_2_00441800 |
Source: | Code function: | 0_2_01950870 | |
Source: | Code function: | 0_2_01950860 | |
Source: | Code function: | 0_2_01952D20 | |
Source: | Code function: | 1_2_00439832 | |
Source: | Code function: | 1_2_0040D0D1 | |
Source: | Code function: | 1_2_0042D8A7 | |
Source: | Code function: | 1_2_00417910 | |
Source: | Code function: | 1_2_0040B920 | |
Source: | Code function: | 1_2_0044F1E0 | |
Source: | Code function: | 1_2_004129EA | |
Source: | Code function: | 1_2_0042E2B1 | |
Source: | Code function: | 1_2_0040EB1E | |
Source: | Code function: | 1_2_0042C380 | |
Source: | Code function: | 1_2_0044A460 | |
Source: | Code function: | 1_2_0042D4EA | |
Source: | Code function: | 1_2_0044FE40 | |
Source: | Code function: | 1_2_00429E30 | |
Source: | Code function: | 1_2_004316C0 | |
Source: | Code function: | 1_2_0041AF10 | |
Source: | Code function: | 1_2_0041BF19 | |
Source: | Code function: | 1_2_004467F0 | |
Source: | Code function: | 1_2_00401040 | |
Source: | Code function: | 1_2_0042E850 | |
Source: | Code function: | 1_2_0041C853 | |
Source: | Code function: | 1_2_0042D01E | |
Source: | Code function: | 1_2_0042A830 | |
Source: | Code function: | 1_2_0044B030 | |
Source: | Code function: | 1_2_0041D0DE | |
Source: | Code function: | 1_2_004370F0 | |
Source: | Code function: | 1_2_004378F0 | |
Source: | Code function: | 1_2_00447940 | |
Source: | Code function: | 1_2_0043A14C | |
Source: | Code function: | 1_2_00425100 | |
Source: | Code function: | 1_2_00439113 | |
Source: | Code function: | 1_2_00448110 | |
Source: | Code function: | 1_2_0043491D | |
Source: | Code function: | 1_2_00424120 | |
Source: | Code function: | 1_2_0043A93A | |
Source: | Code function: | 1_2_0043A1CB | |
Source: | Code function: | 1_2_004329D3 | |
Source: | Code function: | 1_2_004259D0 | |
Source: | Code function: | 1_2_0043E9D0 | |
Source: | Code function: | 1_2_004411E0 | |
Source: | Code function: | 1_2_0043D1B7 | |
Source: | Code function: | 1_2_0043A1B4 | |
Source: | Code function: | 1_2_00408A40 | |
Source: | Code function: | 1_2_0040A220 | |
Source: | Code function: | 1_2_00444A28 | |
Source: | Code function: | 1_2_00402AC0 | |
Source: | Code function: | 1_2_00416ADA | |
Source: | Code function: | 1_2_0044FAE0 | |
Source: | Code function: | 1_2_00445AE0 | |
Source: | Code function: | 1_2_0040CA90 | |
Source: | Code function: | 1_2_004302A0 | |
Source: | Code function: | 1_2_0044EAA2 | |
Source: | Code function: | 1_2_0042EB50 | |
Source: | Code function: | 1_2_0043AB70 | |
Source: | Code function: | 1_2_00424B10 | |
Source: | Code function: | 1_2_0044E320 | |
Source: | Code function: | 1_2_00427B29 | |
Source: | Code function: | 1_2_0044AB30 | |
Source: | Code function: | 1_2_00428337 | |
Source: | Code function: | 1_2_00434BF0 | |
Source: | Code function: | 1_2_0043DBA1 | |
Source: | Code function: | 1_2_00430BA0 | |
Source: | Code function: | 1_2_00409440 | |
Source: | Code function: | 1_2_0044E410 | |
Source: | Code function: | 1_2_0040BC30 | |
Source: | Code function: | 1_2_00421C30 | |
Source: | Code function: | 1_2_00423C35 | |
Source: | Code function: | 1_2_004034F0 | |
Source: | Code function: | 1_2_004174F3 | |
Source: | Code function: | 1_2_00431CF0 | |
Source: | Code function: | 1_2_0041CC8B | |
Source: | Code function: | 1_2_004454AA | |
Source: | Code function: | 1_2_00407D40 | |
Source: | Code function: | 1_2_00445D40 | |
Source: | Code function: | 1_2_0041FD48 | |
Source: | Code function: | 1_2_00434500 | |
Source: | Code function: | 1_2_0043CD1E | |
Source: | Code function: | 1_2_00441520 | |
Source: | Code function: | 1_2_0042ED31 | |
Source: | Code function: | 1_2_00448539 | |
Source: | Code function: | 1_2_0042FDC0 | |
Source: | Code function: | 1_2_00426DD0 | |
Source: | Code function: | 1_2_0040C590 | |
Source: | Code function: | 1_2_0044DD96 | |
Source: | Code function: | 1_2_00424DA0 | |
Source: | Code function: | 1_2_00412DA2 | |
Source: | Code function: | 1_2_0043564C | |
Source: | Code function: | 1_2_00434E76 | |
Source: | Code function: | 1_2_0044BE0B | |
Source: | Code function: | 1_2_0042AE30 | |
Source: | Code function: | 1_2_00431ED1 | |
Source: | Code function: | 1_2_00438681 | |
Source: | Code function: | 1_2_00403E90 | |
Source: | Code function: | 1_2_0043C697 | |
Source: | Code function: | 1_2_004246A4 | |
Source: | Code function: | 1_2_00408EB0 | |
Source: | Code function: | 1_2_0044CE16 | |
Source: | Code function: | 1_2_00443F4A | |
Source: | Code function: | 1_2_0041BF63 | |
Source: | Code function: | 1_2_0041D766 | |
Source: | Code function: | 1_2_00404772 | |
Source: | Code function: | 1_2_00406F76 | |
Source: | Code function: | 1_2_00425710 | |
Source: | Code function: | 1_2_00421724 | |
Source: | Code function: | 1_2_0042C73A | |
Source: | Code function: | 1_2_00439FCB | |
Source: | Code function: | 1_2_00433FCC | |
Source: | Code function: | 1_2_0041E7D4 | |
Source: | Code function: | 1_2_0040EFE0 | |
Source: | Code function: | 1_2_0044A7E0 | |
Source: | Code function: | 1_2_0040F7E7 | |
Source: | Code function: | 1_2_00428FF0 | |
Source: | Code function: | 1_2_004407F3 | |
Source: | Code function: | 1_2_0044F780 | |
Source: | Code function: | 1_2_00410790 |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Code function: | 1_2_004467F0 |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 1_2_00454119 | |
Source: | Code function: | 1_2_0043FC88 | |
Source: | Code function: | 1_2_0045240E | |
Source: | Code function: | 1_2_0043D745 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_1-22591 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 1_2_0044C900 |
Source: | Code function: | 0_2_032F58D1 | |
Source: | Code function: | 0_2_032F5A4E |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_032F58D1 |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 23 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 11 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 231 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 23 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 3 Clipboard Data | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Software Packing | Cached Domain Credentials | 1 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Timestomp | DCSync | 22 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
56% | Virustotal | Browse |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
t.me | 149.154.167.99 | true | false | high | |
sdfwfsdf.icu | 188.114.97.3 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | sdfwfsdf.icu | European Union | 13335 | CLOUDFLARENETUS | true | |
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1630105 |
Start date and time: | 2025-03-05 14:56:27 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Collapse.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/5@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 104.208.16.94, 40.126.31.129, 52.149.20.212, 13.107.246.76
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
08:57:21 | API Interceptor | |
08:57:37 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | GhostRat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
149.154.167.99 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cinoshi Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | Vidar | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer, PureLog Stealer, XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
sdfwfsdf.icu | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | CryptOne, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | FormBook, GuLoader | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS | Browse |
| ||
Get hash | malicious | MSIL Logger, MassLogger RAT | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla, Batch Injector, Discord Token Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS | Browse |
| ||
Get hash | malicious | HTMLPhisher, Invisible JS | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | Amadey, GCleaner, LummaC Stealer, PureLog Stealer | Browse |
|
⊘No context
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Collapse.exe_161f453dad368a349cc0e6c22cfabbd7c2a219e_6caf7603_cf8a2b40-cfa1-4c22-9e0b-9fbece5f611f\Report.wer 
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.8886052502408956 |
Encrypted: | false |
SSDEEP: | 192:H4fVo4GgaVuiGA0LR3EaWGzuiFAZ24IO8H:YfVo4GgmuiGbLR3Ea3zuiFAY4IO8H |
MD5: | F8FDE9331436869AC8AED20EA82634F8 |
SHA1: | 57A1AA0B19172F910EF1630171F0CF2C00B31950 |
SHA-256: | 20952036DBAE5ED00E6C3D65D66E8D0877385D7F30BAFCDBF23E15155FC45233 |
SHA-512: | BEFC8986355B32E24F669684DD6CA363868F74636451476E8505657548C142EB435E0C57698BE32333ECD2F60765A486CBBD223FFE77FF3DC43831D04E303662 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 154966 |
Entropy (8bit): | 3.7818204702271223 |
Encrypted: | false |
SSDEEP: | 1536:2Bq5zuBojRvpN4uE2aOILTguvAwU88pbTT3dOU4qjtTqCD9dNUjDs:2Azf4uEqILTgBN4Gd3Nk |
MD5: | 67002A2AF2247791C3C72C2E528A3022 |
SHA1: | 27BDBF8073E433611CE42571BC90D9DD19EC1F1B |
SHA-256: | 0D624606BF6C3DB45788876BD35CB04AC65E160A0CA5E00F5060230604BF739C |
SHA-512: | 16965703EFDC0AFE2517062C9AFF5FAA1FFD446AB3309B4991CE771079D56D3E234D61E25BD75EAF5A986DCA78F560C92E44E9FFEB9282DDB03BCC7F6ED0CF85 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8378 |
Entropy (8bit): | 3.6897253708418156 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJX961T6YEIASUaigmffVJzprt89bQOsfDfEQm:R6lXJN6x6YEfSUaigmffVJEQNfDfC |
MD5: | 733C2521AC3140DAC2D9D81322DABD7E |
SHA1: | 65AFE6725D479B5700813A666231AAA5E4F015B6 |
SHA-256: | 702C42551236C209409E4F70A080C141111F17F8CC342BED57ADC1D48BE7E388 |
SHA-512: | 790996C4E7B4727F50E1FCA4BCF85BB1563BFF059251CC1E5908AFBDDE0FD6EC344AB4BE6111544B320E5458A42ACA98AD3B320053E3CCFA0DCC16FF973455C2 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4740 |
Entropy (8bit): | 4.440337519675697 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsuJg77aI9YrWpW8VY6Ym8M4JAdxPcf6FR+q8vkdxPcfUOSxvIMM5Cd:uIjfkI7Ka7V6JRfaKVfUOSxvIMM5Cd |
MD5: | B08802DC3D0E1EB8A560715164692946 |
SHA1: | 8D20A9670ECD1E9C2E207848A97BFA4A44142941 |
SHA-256: | E4376A7CB322448133AEFB9529A461FA595911C120839EF335E40A747C400DC6 |
SHA-512: | 30CC45C89773D472E676E25EA0BB5A9D9DF1F35A0441D28F5C7C62BF40E48D58CCA054D7B54E2158F971F4C1E78C463D0051C685616DCBCDB04C903A8F76E8E7 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4217244767449495 |
Encrypted: | false |
SSDEEP: | 6144:ySvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNa0uhiTw9:BvloTMW+EZMM6DFyg03w9 |
MD5: | EC7A67661E2DDBA9F7DB80B58D6449A9 |
SHA1: | 3CC709A4264BAC5618CFEBBD1DCF821106AF7012 |
SHA-256: | 2978565BEF7062F4E7FB63AA5C2A803E431E3C8CA23908A702017D6F6B757BEF |
SHA-512: | A2D3C6FC5EB57FFABA354EFA3F64DF7DFEDBB05350D82791540BD4263DD017DF6F061D1194133AF131E0137AD51EA04F60B571242FF8E3FA716095B6A4D3DA98 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.912331822794405 |
TrID: |
|
File name: | Collapse.exe |
File size: | 425'984 bytes |
MD5: | 04eacc602d626eba16224fdc15ef8aa5 |
SHA1: | b34ada743e5e4ed6b34ae2894b057f8df75efb71 |
SHA256: | 6ac6fce5dddcd7e72952ba3c2e36e92c5c4aac45e2b5226060421193e882d996 |
SHA512: | 08d52e98bd95230f6478396dc3a1e43cd77e8284a3f6c703900ee02a0f8433b2e83159b3cb3b1dfccc951727c9e58b651be4ad3b888f0bd7ec24cbf80a31565f |
SSDEEP: | 12288:z/8Xg+W5MHFU2Ahl3kk1M/vHixeG0XG9otBlyR0u:zgTlU2Ar4/Pi4K9oteD |
TLSH: | 729412497BC8AB72C9A056B5C0F3596582F0E1871977F3C53F441E945F827988E743CA |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.................. ........@.. ....................................`................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40e50e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xAFA985D8 [Wed May 23 05:10:48 2063 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xe4c0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x10000 | 0x598 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xe478 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xc514 | 0xc600 | c8e98fba2c864102aff8d83a8ccc0220 | False | 0.5807686237373737 | data | 6.1883466777474085 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x10000 | 0x598 | 0x600 | 45944832ca66f37df2a22d1e745bbda0 | False | 0.4114583333333333 | data | 4.028483779114603 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12000 | 0xc | 0x200 | f9bf38b490c2b4dad223aadf230001d0 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.CSS | 0x14000 | 0x5ae00 | 0x5ae00 | 243d65d1b33ccd8e4f34c8020ba184e2 | False | 1.0003250730742779 | data | 7.999532940349531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x100a0 | 0x30c | data | 0.4230769230769231 | ||
RT_MANIFEST | 0x103ac | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | |
CompanyName | |
FileDescription | Politic |
FileVersion | 1.0.0.0 |
InternalName | Politic.exe |
LegalCopyright | Copyright 2025 |
LegalTrademarks | |
OriginalFilename | Politic.exe |
ProductName | Politic |
ProductVersion | 1.0.0.0 |
Assembly Version | 1.0.0.0 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-05T14:57:19.214933+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49704 | 149.154.167.99 | 443 | TCP |
2025-03-05T14:57:20.010753+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:22.449792+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:22.449792+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:22.954670+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49712 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:23.516026+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49712 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:24.255162+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49713 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:25.813429+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49714 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:27.573571+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49714 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:28.170505+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:32.599119+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:33.820271+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:37.205618+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49728 | 188.114.97.3 | 443 | TCP |
2025-03-05T14:57:39.257381+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49728 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2025 14:57:18.563942909 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:18.563988924 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:18.564058065 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:18.565562010 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:18.565581083 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.214802980 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.214932919 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.228290081 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.228339911 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.229338884 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.272516012 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.286473036 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.328324080 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477807999 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477871895 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477891922 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477927923 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477935076 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.477965117 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.477987051 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.478005886 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.478012085 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.478070021 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.478117943 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.481570959 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.481585026 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.481600046 CET | 49704 | 443 | 192.168.2.5 | 149.154.167.99 |
Mar 5, 2025 14:57:19.481605053 CET | 443 | 49704 | 149.154.167.99 | 192.168.2.5 |
Mar 5, 2025 14:57:19.506010056 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:19.506037951 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:19.506108999 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:19.506738901 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:19.506756067 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:20.010682106 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:20.010752916 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:20.013755083 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:20.013780117 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:20.014193058 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:20.015610933 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:20.015642881 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:20.015708923 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.449803114 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.449913979 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.450006962 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.451493025 CET | 49705 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.451514006 CET | 443 | 49705 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.455863953 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.455902100 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.455985069 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.456237078 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.456250906 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.954559088 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.954669952 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.958930016 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.958945036 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.959338903 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:22.967647076 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.967668056 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:22.967802048 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516031027 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516092062 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516128063 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516155005 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516166925 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.516191006 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516205072 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.516235113 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516272068 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.516277075 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516717911 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516772032 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.516777992 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516925097 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.516966105 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.516971111 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.520904064 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.520983934 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.520998955 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.562716961 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.609860897 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.609936953 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.609982967 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.610008001 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.655637026 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.655719042 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.659914017 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.659945011 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.659960032 CET | 49712 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.659965992 CET | 443 | 49712 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.771279097 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.771308899 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:23.771389008 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.771667957 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:23.771682978 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:24.255076885 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:24.255162001 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:24.256474018 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:24.256483078 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:24.256877899 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:24.261987925 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:24.262136936 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:24.262177944 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.303967953 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.304080009 CET | 443 | 49713 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.304296017 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.304460049 CET | 49713 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.321156979 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.321182966 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.321294069 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.321583033 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.321595907 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.813327074 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.813429117 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.814970970 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.814985037 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.815385103 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.816653013 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.816803932 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.816840887 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:25.816920042 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:25.860325098 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:27.573621035 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:27.573842049 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:27.573929071 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:27.573992014 CET | 49714 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:27.574026108 CET | 443 | 49714 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:27.659578085 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:27.659601927 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:27.660329103 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:27.668332100 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:27.668349981 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:28.170207977 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:28.170505047 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:28.171710014 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:28.171720982 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:28.172205925 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:28.173590899 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:28.173590899 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:28.173636913 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:28.173721075 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:28.173729897 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:31.902564049 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:31.902661085 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:31.902719021 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:31.909698963 CET | 49715 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:31.909718990 CET | 443 | 49715 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.120346069 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.120364904 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.120676041 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.121279001 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.121289015 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.598936081 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.599118948 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.600326061 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.600342035 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.600651026 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:32.602375984 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.602461100 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:32.602488041 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.039304018 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.039393902 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.039489985 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.039612055 CET | 49719 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.039638042 CET | 443 | 49719 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.348548889 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.348608017 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.348687887 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.348998070 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.349013090 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.820168018 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.820271015 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.821466923 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.821480989 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.821712971 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.822783947 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.823493958 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.823527098 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.823633909 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.823668957 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.823772907 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.823798895 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.823915958 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.823951006 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.824074984 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824105978 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.824250937 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824276924 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.824287891 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824301958 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.824430943 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824455023 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.824476957 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824604988 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.824630022 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.834372044 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.834598064 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.834628105 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:33.834650993 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.834697962 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:33.834830046 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:36.719763994 CET | 443 | 49722 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:36.719984055 CET | 49722 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:36.725373983 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:36.725399017 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:36.725474119 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:36.725769997 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:36.725783110 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:37.205539942 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:37.205617905 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:37.206996918 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:37.207010984 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:37.207237959 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:37.208543062 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:37.208564043 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:37.208609104 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257395029 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257458925 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257503986 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257550001 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257600069 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.257611990 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257657051 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257672071 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.257678032 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257746935 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257812023 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.257817984 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.257904053 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.258013964 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.258090019 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.258184910 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Mar 5, 2025 14:57:39.258291960 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.258291960 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.258291960 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.258346081 CET | 49728 | 443 | 192.168.2.5 | 188.114.97.3 |
Mar 5, 2025 14:57:39.258354902 CET | 443 | 49728 | 188.114.97.3 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 5, 2025 14:57:18.551278114 CET | 54608 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 5, 2025 14:57:18.558835030 CET | 53 | 54608 | 1.1.1.1 | 192.168.2.5 |
Mar 5, 2025 14:57:19.487936974 CET | 54605 | 53 | 192.168.2.5 | 1.1.1.1 |
Mar 5, 2025 14:57:19.505309105 CET | 53 | 54605 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Mar 5, 2025 14:57:18.551278114 CET | 192.168.2.5 | 1.1.1.1 | 0x746f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Mar 5, 2025 14:57:19.487936974 CET | 192.168.2.5 | 1.1.1.1 | 0xe754 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Mar 5, 2025 14:57:18.558835030 CET | 1.1.1.1 | 192.168.2.5 | 0x746f | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false | ||
Mar 5, 2025 14:57:19.505309105 CET | 1.1.1.1 | 192.168.2.5 | 0xe754 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Mar 5, 2025 14:57:19.505309105 CET | 1.1.1.1 | 192.168.2.5 | 0xe754 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49704 | 149.154.167.99 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:19 UTC | 189 | OUT | |
2025-03-05 13:57:19 UTC | 512 | IN | |
2025-03-05 13:57:19 UTC | 12331 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49705 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:20 UTC | 259 | OUT | |
2025-03-05 13:57:20 UTC | 8 | OUT | |
2025-03-05 13:57:22 UTC | 819 | IN | |
2025-03-05 13:57:22 UTC | 7 | IN | |
2025-03-05 13:57:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49712 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:22 UTC | 260 | OUT | |
2025-03-05 13:57:22 UTC | 55 | OUT | |
2025-03-05 13:57:23 UTC | 806 | IN | |
2025-03-05 13:57:23 UTC | 563 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1188 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN | |
2025-03-05 13:57:23 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49713 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:24 UTC | 268 | OUT | |
2025-03-05 13:57:24 UTC | 12784 | OUT | |
2025-03-05 13:57:25 UTC | 812 | IN | |
2025-03-05 13:57:25 UTC | 20 | IN | |
2025-03-05 13:57:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49714 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:25 UTC | 272 | OUT | |
2025-03-05 13:57:25 UTC | 15050 | OUT | |
2025-03-05 13:57:27 UTC | 807 | IN | |
2025-03-05 13:57:27 UTC | 20 | IN | |
2025-03-05 13:57:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49715 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:28 UTC | 277 | OUT | |
2025-03-05 13:57:28 UTC | 15331 | OUT | |
2025-03-05 13:57:28 UTC | 5239 | OUT | |
2025-03-05 13:57:31 UTC | 813 | IN | |
2025-03-05 13:57:31 UTC | 20 | IN | |
2025-03-05 13:57:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49719 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:32 UTC | 269 | OUT | |
2025-03-05 13:57:32 UTC | 2686 | OUT | |
2025-03-05 13:57:33 UTC | 813 | IN | |
2025-03-05 13:57:33 UTC | 20 | IN | |
2025-03-05 13:57:33 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49722 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:33 UTC | 269 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:33 UTC | 15331 | OUT | |
2025-03-05 13:57:36 UTC | 808 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49728 | 188.114.97.3 | 443 | 7096 | C:\Users\user\Desktop\Collapse.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-03-05 13:57:37 UTC | 260 | OUT | |
2025-03-05 13:57:37 UTC | 89 | OUT | |
2025-03-05 13:57:39 UTC | 809 | IN | |
2025-03-05 13:57:39 UTC | 560 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 407 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN | |
2025-03-05 13:57:39 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:57:17 |
Start date: | 05/03/2025 |
Path: | C:\Users\user\Desktop\Collapse.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf40000 |
File size: | 425'984 bytes |
MD5 hash: | 04EACC602D626EBA16224FDC15EF8AA5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:57:17 |
Start date: | 05/03/2025 |
Path: | C:\Users\user\Desktop\Collapse.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf50000 |
File size: | 425'984 bytes |
MD5 hash: | 04EACC602D626EBA16224FDC15EF8AA5 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 4 |
Start time: | 08:57:17 |
Start date: | 05/03/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |