Windows
Analysis Report
Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe
Overview
General Information
Detection
Lokibot
Score: | 100 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Lokibot
.NET source code contains potential unpacker
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Loading BitLocker PowerShell Module
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe (PID: 6212 cmdline:
"C:\Users\ user\Deskt op\Shipmen t_Docus_CO SCO_202503 07_3540564 9_pdf.bat. exe" MD5: 2EBEC0083B5B2E5383A18B60FACAD07C) powershell.exe (PID: 4092 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Add-MpPref erence -Ex clusionPat h "C:\User s\user\Des ktop\Shipm ent_Docus_ COSCO_2025 0307_35405 649_pdf.ba t.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 3320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) WmiPrvSE.exe (PID: 6984 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe (PID: 2140 cmdline:
"C:\Users\ user\Deskt op\Shipmen t_Docus_CO SCO_202503 07_3540564 9_pdf.bat. exe" MD5: 2EBEC0083B5B2E5383A18B60FACAD07C)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Loki Password Stealer (PWS), LokiBot | "Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2 |
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot_1 | Yara detected Lokibot | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Windows_Trojan_Lokibot_0f421617 | unknown | unknown |
| |
Click to see the 28 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Lokibot | Yara detected Lokibot | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_aPLib_compressed_binary | Yara detected aPLib compressed binary | Joe Security | ||
Windows_Trojan_Lokibot_1f885282 | unknown | unknown |
| |
Click to see the 37 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:15.952104+0100 | 2024312 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.096044+0100 | 2024312 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:15.016953+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:22.262059+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:24.280450+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:28.252431+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.261790+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.144976+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:36.223994+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:38.286416+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:42.436062+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:44.492511+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:48.342766+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:50.571633+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:52.611614+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:54.471504+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:56.531253+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:58.517773+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:06.454970+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.107884+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:19.830030+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:21.749546+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:23.671748+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:25.749698+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:31.357537+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:33.311187+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:38.308944+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.250290+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.075913+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.013591+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:45.812175+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:47.967407+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:49.967481+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:51.857282+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:53.826111+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:57.675091+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:59.470619+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:03.435839+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.171706+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:13.761445+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:15.675191+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2025381 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:21.111104+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49740 | TCP |
2025-03-07T08:24:23.132235+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49741 | TCP |
2025-03-07T08:24:27.096804+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49743 | TCP |
2025-03-07T08:24:29.058560+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49745 | TCP |
2025-03-07T08:24:30.988596+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49746 | TCP |
2025-03-07T08:24:35.054813+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49748 | TCP |
2025-03-07T08:24:37.123128+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49749 | TCP |
2025-03-07T08:24:41.163880+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49751 | TCP |
2025-03-07T08:24:43.330839+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49752 | TCP |
2025-03-07T08:24:47.181143+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49754 | TCP |
2025-03-07T08:24:49.157166+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49755 | TCP |
2025-03-07T08:24:51.456830+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49756 | TCP |
2025-03-07T08:24:53.322281+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49757 | TCP |
2025-03-07T08:24:55.381294+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49758 | TCP |
2025-03-07T08:24:57.356353+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49759 | TCP |
2025-03-07T08:25:05.304132+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49764 | TCP |
2025-03-07T08:25:12.954696+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49770 | TCP |
2025-03-07T08:25:18.680858+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49777 | TCP |
2025-03-07T08:25:20.592318+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49778 | TCP |
2025-03-07T08:25:22.522515+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49779 | TCP |
2025-03-07T08:25:24.438733+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49780 | TCP |
2025-03-07T08:25:30.207269+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49788 | TCP |
2025-03-07T08:25:32.153167+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49789 | TCP |
2025-03-07T08:25:37.060188+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49792 | TCP |
2025-03-07T08:25:39.093482+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49793 | TCP |
2025-03-07T08:25:40.907252+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49794 | TCP |
2025-03-07T08:25:42.860696+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49795 | TCP |
2025-03-07T08:25:44.654383+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49796 | TCP |
2025-03-07T08:25:46.654242+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49797 | TCP |
2025-03-07T08:25:48.800830+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49803 | TCP |
2025-03-07T08:25:50.701884+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49804 | TCP |
2025-03-07T08:25:52.667670+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49805 | TCP |
2025-03-07T08:25:56.497743+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49807 | TCP |
2025-03-07T08:25:58.316752+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49808 | TCP |
2025-03-07T08:26:02.206157+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49810 | TCP |
2025-03-07T08:26:05.998810+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49812 | TCP |
2025-03-07T08:26:12.607088+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49816 | TCP |
2025-03-07T08:26:14.538815+0100 | 2025483 | 1 | A Network Trojan was detected | 104.21.112.1 | 80 | 192.168.2.4 | 49817 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:19.082760+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:21.106091+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:23.125095+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:25.039844+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:27.091578+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:29.053470+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.983553+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.988040+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:35.048363+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:37.117967+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:39.078178+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:41.143475+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:43.325583+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:45.280345+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:47.175993+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:49.150723+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:51.451712+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:53.316430+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:55.376170+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:57.351310+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:59.260948+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:01.390790+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:03.339456+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:05.299137+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:07.200606+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:09.121305+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.998882+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.949268+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.847990+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.748573+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:18.675762+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:20.587269+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:22.517407+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:24.433485+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:26.488716+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:28.391050+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:30.201618+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:32.148176+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:35.070684+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:37.055102+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:39.088328+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.902109+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.855622+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.649256+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:46.646752+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:48.795742+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:50.696739+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:52.662595+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:54.557778+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:56.492057+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:58.311517+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:00.211017+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:02.145508+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:04.185987+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.993706+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.911549+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.978728+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:12.602010+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:14.533811+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:16.409908+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:18.339274+0100 | 2024313 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:15.016953+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:22.262059+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:24.280450+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:28.252431+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.261790+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.144976+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:36.223994+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:38.286416+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:42.436062+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:44.492511+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:48.342766+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:50.571633+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:52.611614+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:54.471504+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:56.531253+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:58.517773+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:06.454970+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.107884+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:19.830030+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:21.749546+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:23.671748+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:25.749698+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:31.357537+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:33.311187+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:38.308944+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.250290+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.075913+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.013591+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:45.812175+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:47.967407+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:49.967481+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:51.857282+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:53.826111+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:57.675091+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:59.470619+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:03.435839+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.171706+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:13.761445+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:15.675191+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2021641 | 1 | A Network Trojan was detected | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:15.016953+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:22.262059+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:24.280450+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:28.252431+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.261790+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.144976+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:36.223994+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:38.286416+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:42.436062+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:44.492511+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:48.342766+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:50.571633+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:52.611614+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:54.471504+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:56.531253+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:58.517773+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:06.454970+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.107884+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:19.830030+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:21.749546+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:23.671748+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:25.749698+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:31.357537+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:33.311187+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:38.308944+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.250290+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.075913+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.013591+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:45.812175+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:47.967407+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:49.967481+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:51.857282+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:53.826111+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:57.675091+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:59.470619+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:03.435839+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.171706+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:13.761445+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:15.675191+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2825766 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 3_2_00403D74 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 3_2_00404ED4 |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Code function: | 0_2_02F73E40 | |
Source: | Code function: | 0_2_02F76F90 | |
Source: | Code function: | 0_2_02F7DA7C | |
Source: | Code function: | 0_2_05582131 | |
Source: | Code function: | 0_2_05580518 | |
Source: | Code function: | 0_2_05580509 | |
Source: | Code function: | 0_2_0560B56C | |
Source: | Code function: | 0_2_056087C8 | |
Source: | Code function: | 0_2_056087D8 | |
Source: | Code function: | 0_2_0560D178 | |
Source: | Code function: | 0_2_0799E700 | |
Source: | Code function: | 0_2_0799C720 | |
Source: | Code function: | 0_2_0799E6F0 | |
Source: | Code function: | 0_2_0799C2B5 | |
Source: | Code function: | 0_2_0799C2E8 | |
Source: | Code function: | 0_2_0799EC10 | |
Source: | Code function: | 0_2_0799CB58 | |
Source: | Code function: | 0_2_07B732D8 | |
Source: | Code function: | 3_2_0040549C | |
Source: | Code function: | 3_2_004029D4 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | Code function: | 3_2_0040650A |
Source: | Code function: | 3_2_0040434D |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_05585F42 | |
Source: | Code function: | 3_2_00402AD4 | |
Source: | Code function: | 3_2_00402AFC |
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 3_2_00403D74 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 3_2_0040317B |
Source: | Code function: | 3_2_00402B7C |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Code function: | 3_2_0040D069 | |
Source: | Code function: | 3_2_0040D069 |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 Access Token Manipulation | 1 Masquerading | 2 OS Credential Dumping | 11 Security Software Discovery | Remote Services | 1 Email Collection | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 111 Process Injection | 11 Disable or Modify Tools | 2 Credentials in Registry | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | Security Account Manager | 31 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 2 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Access Token Manipulation | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 113 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 111 Process Injection | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Deobfuscate/Decode Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 3 Obfuscated Files or Information | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 12 Software Packing | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 DLL Side-Loading | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
38% | Virustotal | Browse | ||
32% | ReversingLabs | ByteCode-MSIL.Trojan.Genie8DN | ||
100% | Avira | HEUR/AGEN.1307372 |
⊘No Antivirus matches
⊘No Antivirus matches
⊘No Antivirus matches
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | phishing | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | phishing |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
touxzw.ir | 104.21.112.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.112.1 | touxzw.ir | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1631486 |
Start date and time: | 2025-03-07 08:23:17 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 48s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@7/8@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, ctldl.windowsupdate.com, arc.msn.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
02:24:11 | API Interceptor | |
02:24:13 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.112.1 | Get hash | malicious | Lokibot | Browse |
| |
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
touxzw.ir | Get hash | malicious | Lokibot | Browse |
| |
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | KillMBR | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
⊘No context
⊘No context
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe.log 
Download File
Process: | C:\Users\user\Desktop\Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2232 |
Entropy (8bit): | 5.379460230152629 |
Encrypted: | false |
SSDEEP: | 48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZeUyus:fLHyIFKL3IZ2KRH9Ougos |
MD5: | 28F8623974ADE7FF0B49C3406E91E372 |
SHA1: | 739F9DD671D9788B182A7A2D506A3919CA1C6098 |
SHA-256: | 3CFE86C229FC35A9886CD7D5A46DFF98C0389C9294C35AA82FA4F907A72E8269 |
SHA-512: | 93E2DC72E86EE4006A29687F845FA384C4B3DF320191C77E64CF3EF751D641BB51328F5F36F31FF781F07233A4D3BF24DBC57CCE9B943756257D0A1E0912AB32 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:U:U |
MD5: | C4CA4238A0B923820DCC509A6F75849B |
SHA1: | 356A192B7913B04C54574D18C28D46E6395428AB |
SHA-256: | 6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B |
SHA-512: | 4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06
Download File
Process: | C:\Users\user\Desktop\Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46 |
Entropy (8bit): | 1.0424600748477153 |
Encrypted: | false |
SSDEEP: | 3:/lbq:4 |
MD5: | 8CB7B7F28464C3FCBAE8A10C46204572 |
SHA1: | 767FE80969EC2E67F54CC1B6D383C76E7859E2DE |
SHA-256: | ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96 |
SHA-512: | 9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.804274709362841 |
TrID: |
|
File name: | Shipment_Docus_COSCO_20250307_35405649_pdf.bat.exe |
File size: | 508'928 bytes |
MD5: | 2ebec0083b5b2e5383a18b60facad07c |
SHA1: | be16ecd499f895583cf3d4e7dec37d0bbe37db5c |
SHA256: | cb3a38b5b53f478a2a83ea040885ccb2bea9d29e3d9db4af38914bcd21bf89db |
SHA512: | 89eccaf2a4eb4d38be68f50bd236224786ea4f361f1fbe233a995a5418121b7b50c77cfd2ccf5a26a1bca641aa32fd610e293e80e5d654fd0cc7a9b3d75752dd |
SSDEEP: | 12288:vqX+0LeY8o+62ZxHFz/d6PSEKuN8bTF8QjlN5Eeg62r:vu++eYJ+62ZxBd+kHaQP5Ett |
TLSH: | 07B401E97A98CD22DEE81B700632E37A4378AE9DE411E3475AED9CEF74213347518352 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...lo.g..............0.................. ........@.. ....................... ............@................................ |
Icon Hash: | 7549656d6d398e8d |
Entrypoint: | 0x47cc16 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67CA6F6C [Fri Mar 7 04:00:44 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x7cbc4 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x7e000 | 0x10c4 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x80000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x7ac1c | 0x7ae00 | 473a746f79fd4c8d5c382372162ba506 | False | 0.918634362283825 | data | 7.817160563060522 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x7e000 | 0x10c4 | 0x1200 | c744f2099483a370d2ac6c7db0bf7f13 | False | 0.7135416666666666 | data | 6.446198374007925 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x80000 | 0xc | 0x200 | e3d10071989b1b23f8462a47a50d0ede | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x7e0c8 | 0xc7a | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.8810269254852849 | ||
RT_GROUP_ICON | 0x7ed54 | 0x14 | data | 1.05 | ||
RT_VERSION | 0x7ed78 | 0x348 | data | 0.4357142857142857 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Description | Data |
---|---|
Translation | 0x0000 0x04b0 |
Comments | ExternalDSL |
CompanyName | WF_SINCOS |
FileDescription | WF LOGIN |
FileVersion | 1.1.2.2 |
InternalName | LFgx.exe |
LegalCopyright | WF_SINCOS 2024 (C) |
LegalTrademarks | ExternalDSL |
OriginalFilename | LFgx.exe |
ProductName | WF-LOGIN |
ProductVersion | 1.1.2.2 |
Assembly Version | 1.1.0.0 |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-03-07T08:24:15.016953+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:15.016953+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:15.016953+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:15.952104+0100 | 2024312 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 | 1 | 192.168.2.4 | 49736 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:17.286057+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.096044+0100 | 2024312 | ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 | 1 | 192.168.2.4 | 49738 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:18.203172+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:19.082760+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49739 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:20.253277+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:21.106091+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49740 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:21.111104+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49740 | TCP |
2025-03-07T08:24:22.262059+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:22.262059+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:22.262059+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:23.125095+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49741 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:23.132235+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49741 | TCP |
2025-03-07T08:24:24.280450+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:24.280450+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:24.280450+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:25.039844+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49742 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:26.201904+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:27.091578+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49743 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:27.096804+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49743 | TCP |
2025-03-07T08:24:28.252431+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:28.252431+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:28.252431+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:29.053470+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49745 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:29.058560+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49745 | TCP |
2025-03-07T08:24:30.261790+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.261790+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.261790+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.983553+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49746 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:30.988596+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49746 | TCP |
2025-03-07T08:24:32.144976+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.144976+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.144976+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:32.988040+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49747 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:34.171879+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:35.048363+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49748 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:35.054813+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49748 | TCP |
2025-03-07T08:24:36.223994+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:36.223994+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:36.223994+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:37.117967+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49749 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:37.123128+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49749 | TCP |
2025-03-07T08:24:38.286416+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:38.286416+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:38.286416+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:39.078178+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49750 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:40.256520+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:41.143475+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49751 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:41.163880+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49751 | TCP |
2025-03-07T08:24:42.436062+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:42.436062+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:42.436062+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:43.325583+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49752 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:43.330839+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49752 | TCP |
2025-03-07T08:24:44.492511+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:44.492511+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:44.492511+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:45.280345+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49753 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:46.435568+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:47.175993+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49754 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:47.181143+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49754 | TCP |
2025-03-07T08:24:48.342766+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:48.342766+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:48.342766+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:49.150723+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49755 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:49.157166+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49755 | TCP |
2025-03-07T08:24:50.571633+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:50.571633+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:50.571633+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:51.451712+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49756 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:51.456830+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49756 | TCP |
2025-03-07T08:24:52.611614+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:52.611614+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:52.611614+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:53.316430+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49757 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:53.322281+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49757 | TCP |
2025-03-07T08:24:54.471504+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:54.471504+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:54.471504+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:55.376170+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49758 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:55.381294+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49758 | TCP |
2025-03-07T08:24:56.531253+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:56.531253+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:56.531253+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:57.351310+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49759 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:57.356353+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49759 | TCP |
2025-03-07T08:24:58.517773+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:58.517773+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:58.517773+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:24:59.260948+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49760 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:00.654075+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:01.390790+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49762 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:02.564181+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:03.339456+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49763 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:04.503853+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:05.299137+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49764 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:05.304132+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49764 | TCP |
2025-03-07T08:25:06.454970+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:06.454970+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:06.454970+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:07.200606+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49766 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:08.384288+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:09.121305+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49768 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.286089+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:10.998882+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49769 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.156848+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.949268+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49770 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:12.954696+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49770 | TCP |
2025-03-07T08:25:14.107884+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.107884+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.107884+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:14.847990+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49771 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.002778+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:16.748573+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49776 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:17.904744+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:18.675762+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49777 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:18.680858+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49777 | TCP |
2025-03-07T08:25:19.830030+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:19.830030+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:19.830030+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:20.587269+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49778 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:20.592318+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49778 | TCP |
2025-03-07T08:25:21.749546+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:21.749546+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:21.749546+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:22.517407+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49779 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:22.522515+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49779 | TCP |
2025-03-07T08:25:23.671748+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:23.671748+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:23.671748+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:24.433485+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49780 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:24.438733+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49780 | TCP |
2025-03-07T08:25:25.749698+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:25.749698+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:25.749698+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:26.488716+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49781 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:27.653206+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:28.391050+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49787 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:29.562621+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:30.201618+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49788 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:30.207269+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49788 | TCP |
2025-03-07T08:25:31.357537+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:31.357537+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:31.357537+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:32.148176+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49789 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:32.153167+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49789 | TCP |
2025-03-07T08:25:33.311187+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:33.311187+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:33.311187+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:35.070684+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49790 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:36.249224+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:37.055102+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49792 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:37.060188+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49792 | TCP |
2025-03-07T08:25:38.308944+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:38.308944+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:38.308944+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:39.088328+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49793 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:39.093482+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49793 | TCP |
2025-03-07T08:25:40.250290+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.250290+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.250290+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.902109+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49794 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:40.907252+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49794 | TCP |
2025-03-07T08:25:42.075913+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.075913+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.075913+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.855622+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49795 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:42.860696+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49795 | TCP |
2025-03-07T08:25:44.013591+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.013591+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.013591+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.649256+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49796 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:44.654383+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49796 | TCP |
2025-03-07T08:25:45.812175+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:45.812175+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:45.812175+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:46.646752+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49797 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:46.654242+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49797 | TCP |
2025-03-07T08:25:47.967407+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:47.967407+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:47.967407+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:48.795742+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49803 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:48.800830+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49803 | TCP |
2025-03-07T08:25:49.967481+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:49.967481+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:49.967481+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:50.696739+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49804 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:50.701884+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49804 | TCP |
2025-03-07T08:25:51.857282+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:51.857282+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:51.857282+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:52.662595+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49805 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:52.667670+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49805 | TCP |
2025-03-07T08:25:53.826111+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:53.826111+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:53.826111+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:54.557778+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49806 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:55.717079+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:56.492057+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49807 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:56.497743+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49807 | TCP |
2025-03-07T08:25:57.675091+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:57.675091+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:57.675091+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:58.311517+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49808 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:58.316752+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49808 | TCP |
2025-03-07T08:25:59.470619+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:59.470619+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:25:59.470619+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:00.211017+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49809 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:01.372642+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:02.145508+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49810 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:02.206157+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49810 | TCP |
2025-03-07T08:26:03.435839+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:03.435839+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:03.435839+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:04.185987+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49811 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.350336+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.993706+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49812 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:05.998810+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49812 | TCP |
2025-03-07T08:26:07.171706+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.171706+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.171706+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:07.911549+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49813 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.225970+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:09.978728+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49815 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:11.148750+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:12.602010+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49816 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:12.607088+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49816 | TCP |
2025-03-07T08:26:13.761445+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:13.761445+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:13.761445+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:14.533811+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49817 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:14.538815+0100 | 2025483 | ET MALWARE LokiBot Fake 404 Response | 1 | 104.21.112.1 | 80 | 192.168.2.4 | 49817 | TCP |
2025-03-07T08:26:15.675191+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:15.675191+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:15.675191+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:16.409908+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49818 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2021641 | ET MALWARE LokiBot User-Agent (Charon/Inferno) | 1 | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2025381 | ET MALWARE LokiBot Checkin | 1 | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:17.570526+0100 | 2825766 | ETPRO MALWARE LokiBot Checkin M2 | 1 | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
2025-03-07T08:26:18.339274+0100 | 2024313 | ET MALWARE LokiBot Request for C2 Commands Detected M1 | 1 | 192.168.2.4 | 49819 | 104.21.112.1 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Mar 7, 2025 08:24:15.004122972 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.009285927 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:15.009426117 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.011795998 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.016875982 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:15.016952991 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.021989107 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:15.951647997 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:15.952039957 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:15.952104092 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.954407930 CET | 49736 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:15.959448099 CET | 80 | 49736 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:17.271826982 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:17.278059959 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:17.278151989 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:17.281002998 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:17.286003113 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:17.286056995 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:17.291102886 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.095915079 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.096044064 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.096714020 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.096770048 CET | 49738 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.101087093 CET | 80 | 49738 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.188363075 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.193470001 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.193550110 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.197801113 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.202980042 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:18.203171968 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:18.208273888 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:19.082623005 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:19.082760096 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:19.083045006 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:19.083105087 CET | 49739 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:19.089262009 CET | 80 | 49739 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:20.239495993 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:20.244755983 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:20.244843006 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:20.248239040 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:20.253200054 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:20.253277063 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:20.258395910 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:21.105022907 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:21.105885983 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:21.106091022 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:21.106122017 CET | 49740 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:21.111104012 CET | 80 | 49740 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:22.249970913 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:22.255109072 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:22.255239964 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:22.257050037 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:22.261991978 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:22.262058973 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:22.267061949 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:23.124923944 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:23.125094891 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:23.125858068 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:23.125911951 CET | 49741 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:23.132235050 CET | 80 | 49741 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:24.267960072 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:24.273185015 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:24.273288012 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:24.275347948 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:24.280378103 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:24.280450106 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:24.286236048 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:25.039501905 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:25.039844036 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:25.040375948 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:25.040481091 CET | 49742 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:25.044989109 CET | 80 | 49742 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:26.189235926 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:26.194439888 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:26.194535971 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:26.196770906 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:26.201848030 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:26.201904058 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:26.206913948 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:27.091362953 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:27.091578007 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:27.092073917 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:27.092166901 CET | 49743 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:27.096803904 CET | 80 | 49743 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:28.239829063 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:28.245106936 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:28.245199919 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:28.247355938 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:28.252373934 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:28.252430916 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:28.257504940 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:29.053229094 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:29.053405046 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:29.053469896 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:29.053864002 CET | 49745 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:29.058559895 CET | 80 | 49745 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.249460936 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.254545927 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.254617929 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.256750107 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.261728048 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.261790037 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.266776085 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.983320951 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.983552933 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.984126091 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:30.984196901 CET | 49746 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:30.988595963 CET | 80 | 49746 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.131572962 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.136722088 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.136795998 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.139805079 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.144929886 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.144975901 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.149980068 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.987624884 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.988012075 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:32.988039970 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.988152981 CET | 49747 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:32.993113995 CET | 80 | 49747 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:34.159343958 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:34.164499044 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:34.164592981 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:34.166776896 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:34.171813965 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:34.171879053 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:34.176935911 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:35.048249960 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:35.048362970 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:35.049088001 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:35.049431086 CET | 49748 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:35.054812908 CET | 80 | 49748 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:36.210815907 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:36.216572046 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:36.216779947 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:36.218920946 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:36.223927975 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:36.223994017 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:36.228990078 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:37.117856026 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:37.117966890 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:37.118242025 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:37.118309021 CET | 49749 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:37.123127937 CET | 80 | 49749 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:38.272823095 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:38.278172970 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:38.278274059 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:38.281239986 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:38.286356926 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:38.286416054 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:38.291850090 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:39.078057051 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:39.078177929 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:39.079180002 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:39.079236984 CET | 49750 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:39.083285093 CET | 80 | 49750 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:40.243923903 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:40.249145985 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:40.249253988 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:40.251280069 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:40.256378889 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:40.256520033 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:40.261665106 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:41.142829895 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:41.143013000 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:41.143475056 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:41.158804893 CET | 49751 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:41.163880110 CET | 80 | 49751 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:42.423628092 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:42.428761959 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:42.428857088 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:42.430962086 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:42.436006069 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:42.436062098 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:42.441097021 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:43.325476885 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:43.325582981 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:43.326230049 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:43.326304913 CET | 49752 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:43.330838919 CET | 80 | 49752 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:44.479937077 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:44.485059977 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:44.485141039 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:44.487422943 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:44.492434025 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:44.492511034 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:44.497673988 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:45.280227900 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:45.280344963 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:45.280565023 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:45.280621052 CET | 49753 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:45.285410881 CET | 80 | 49753 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:46.422513008 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:46.427756071 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:46.427886009 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:46.429946899 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:46.435506105 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:46.435568094 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:46.440668106 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:47.175766945 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:47.175992966 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:47.176251888 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:47.176345110 CET | 49754 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:47.181143045 CET | 80 | 49754 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:48.330306053 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:48.335428953 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:48.335598946 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:48.337697029 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:48.342664957 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:48.342766047 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:48.347748041 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:49.150516033 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:49.150722980 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:49.151443005 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:49.151514053 CET | 49755 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:49.157166004 CET | 80 | 49755 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:50.557974100 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:50.563265085 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:50.563357115 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:50.566477060 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:50.571557045 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:50.571633101 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:50.576807022 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:51.451486111 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:51.451711893 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:51.452732086 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:51.452814102 CET | 49756 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:51.456830025 CET | 80 | 49756 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:52.599116087 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:52.604325056 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:52.604413033 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:52.606384039 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:52.611566067 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:52.611613989 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:52.616904974 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:53.316329002 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:53.316356897 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:53.316430092 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:53.316431046 CET | 49757 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:53.322280884 CET | 80 | 49757 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:54.457858086 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:54.463099003 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:54.463217020 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:54.466336012 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:54.471400023 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:54.471503973 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:54.476525068 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:55.375991106 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:55.376169920 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:55.376575947 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:55.376630068 CET | 49758 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:55.381294012 CET | 80 | 49758 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:56.518755913 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:56.523899078 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:56.524010897 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:56.526103973 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:56.531188011 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:56.531253099 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:56.536345005 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:57.351206064 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:57.351310015 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:57.352010012 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:57.352057934 CET | 49759 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:57.356353045 CET | 80 | 49759 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:58.501465082 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:58.510590076 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:58.510695934 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:58.512675047 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:58.517710924 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:58.517772913 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:58.523937941 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:59.260788918 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:59.260947943 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:59.261038065 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:24:59.261101007 CET | 49760 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:24:59.266035080 CET | 80 | 49760 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:00.641539097 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:00.646687031 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:00.646785021 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:00.648854017 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:00.654017925 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:00.654074907 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:00.659328938 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:01.389893055 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:01.390650988 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:01.390789986 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:01.391308069 CET | 49762 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:01.396315098 CET | 80 | 49762 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:02.550986052 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:02.556325912 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:02.556416035 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:02.558373928 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:02.564105034 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:02.564181089 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:02.569252014 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:03.339343071 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:03.339396954 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:03.339456081 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:03.339488983 CET | 49763 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:03.344578981 CET | 80 | 49763 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:04.491497040 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:04.496587038 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:04.496680021 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:04.498773098 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:04.503792048 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:04.503853083 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:04.508908987 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:05.299025059 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:05.299137115 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:05.299664021 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:05.299715996 CET | 49764 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:05.304131985 CET | 80 | 49764 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:06.441013098 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:06.446089983 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:06.446393013 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:06.449342012 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:06.454412937 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:06.454969883 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:06.459995031 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:07.200463057 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:07.200606108 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:07.201373100 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:07.201432943 CET | 49766 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:07.205641985 CET | 80 | 49766 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:08.369751930 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:08.376800060 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:08.376887083 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:08.378922939 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:08.384191036 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:08.384288073 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:08.389628887 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:09.121170998 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:09.121304989 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:09.121414900 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:09.121469975 CET | 49768 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:09.126338005 CET | 80 | 49768 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.268779039 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:10.273947954 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.274080038 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:10.276015997 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:10.280985117 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.286088943 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:10.291150093 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.998694897 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.998882055 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:10.998892069 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:10.998939991 CET | 49769 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:11.003917933 CET | 80 | 49769 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.140743017 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.145848989 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.148416996 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.151772976 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.156774998 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.156847954 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.161885977 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.949110985 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.949268103 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.949754953 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:12.949812889 CET | 49770 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:12.954695940 CET | 80 | 49770 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.095247984 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.100586891 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.100806952 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.102811098 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.107810020 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.107883930 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.112940073 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.847697973 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.847990036 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.849046946 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:14.849121094 CET | 49771 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:14.853151083 CET | 80 | 49771 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:15.990397930 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:15.995769978 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:15.995883942 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:15.997627020 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:16.002702951 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:16.002778053 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:16.007841110 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:16.748437881 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:16.748573065 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:16.748599052 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:16.748672009 CET | 49776 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:16.753803968 CET | 80 | 49776 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:17.892467022 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:17.897658110 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:17.897774935 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:17.899532080 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:17.904670000 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:17.904743910 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:17.909862041 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:18.675611973 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:18.675761938 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:18.675956011 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:18.676023960 CET | 49777 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:18.680857897 CET | 80 | 49777 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:19.817620039 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:19.822829962 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:19.823103905 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:19.824899912 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:19.829938889 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:19.830029964 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:19.834999084 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:20.587040901 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:20.587250948 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:20.587269068 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:20.587313890 CET | 49778 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:20.592318058 CET | 80 | 49778 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:21.736988068 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:21.742186069 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:21.742273092 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:21.744376898 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:21.749469042 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:21.749546051 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:21.754602909 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:22.517296076 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:22.517406940 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:22.517498016 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:22.517576933 CET | 49779 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:22.522515059 CET | 80 | 49779 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:23.656856060 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:23.663157940 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:23.663242102 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:23.665292025 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:23.671678066 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:23.671747923 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:23.677361012 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:24.433320999 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:24.433485031 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:24.434286118 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:24.434351921 CET | 49780 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:24.438733101 CET | 80 | 49780 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:25.731313944 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:25.736450911 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:25.736535072 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:25.744610071 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:25.749635935 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:25.749697924 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:25.754720926 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:26.488351107 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:26.488715887 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:26.489084959 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:26.489203930 CET | 49781 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:26.493721962 CET | 80 | 49781 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:27.640124083 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:27.645333052 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:27.645442009 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:27.647439003 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:27.653136969 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:27.653206110 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:27.658611059 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:28.390536070 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:28.390985966 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:28.391050100 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:28.405308962 CET | 49787 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:28.410365105 CET | 80 | 49787 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:29.549964905 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:29.555212021 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:29.555337906 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:29.557399988 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:29.562508106 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:29.562621117 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:29.567791939 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:30.201138973 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:30.201617956 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:30.201697111 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:30.201766968 CET | 49788 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:30.207268953 CET | 80 | 49788 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:31.344387054 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:31.350107908 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:31.350271940 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:31.352372885 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:31.357471943 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:31.357537031 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:31.362680912 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:32.148036957 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:32.148175955 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:32.148459911 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:32.148519039 CET | 49789 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:32.153167009 CET | 80 | 49789 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:33.298305988 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:33.303504944 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:33.303586960 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:33.305759907 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:33.311012030 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:33.311187029 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:33.316447020 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:35.070525885 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:35.070630074 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:35.070683956 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:35.074131966 CET | 49790 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:35.075731039 CET | 80 | 49790 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:36.236746073 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:36.241894960 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:36.242002010 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:36.244128942 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:36.249162912 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:36.249223948 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:36.254283905 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:37.054687023 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:37.055012941 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:37.055102110 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:37.055147886 CET | 49792 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:37.060188055 CET | 80 | 49792 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:38.296657085 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:38.301757097 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:38.301862001 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:38.303913116 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:38.308892012 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:38.308943987 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:38.314141989 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:39.088191032 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:39.088327885 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:39.088407040 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:39.088459969 CET | 49793 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:39.093482018 CET | 80 | 49793 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.237452030 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.242649078 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.242758036 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.244874954 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.250214100 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.250289917 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.255404949 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.901906013 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.902028084 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:40.902108908 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.902110100 CET | 49794 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:40.907252073 CET | 80 | 49794 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.063433886 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.068689108 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.068804979 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.070841074 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.075824976 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.075912952 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.081012964 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.855292082 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.855622053 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.856211901 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:42.856280088 CET | 49795 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:42.860696077 CET | 80 | 49795 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.000328064 CET | 49796 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:44.006071091 CET | 80 | 49796 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.006196022 CET | 49796 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:44.008277893 CET | 49796 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:44.013514996 CET | 80 | 49796 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.013591051 CET | 49796 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:44.018651962 CET | 80 | 49796 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.649130106 CET | 80 | 49796 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.649255991 CET | 49796 | 80 | 192.168.2.4 | 104.21.112.1 |
Mar 7, 2025 08:25:44.649602890 CET | 80 | 49796 | 104.21.112.1 | 192.168.2.4 |
Mar 7, 2025 08:25:44.649660110 CET | 49796 | 80 |