Analysis Date2015-10-11 14:42:44
MD50850d58906e9101732e4e716f09f9ee6
SHA139de332211b5de6236a4d962fbb0901f39ba70a7

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 4456c91d2503b71b2f15223e710c2378 sha1: 0c2a75fe1edd8f203de5ffe440dc378e360106aa size: 1387008
Section.rdata md5: dc62070ec8fdb21f14c073b227c674bb sha1: 6bfb0572d7880bf7b8621d93e43cdf3eeb324728 size: 338432
Section.data md5: 5135c9f79d90dbd5b70a22680b0a3405 sha1: 0a9774aec89a484d021fc410c484a782c3b3a6f3 size: 7680
Section.reloc md5: ae4a6617fe0c22ae668eacd9508a5e4c sha1: a43d0cf7af874c4e9cfb325b8e34f61b5acfaaa5 size: 194048
Timestamp2015-05-11 04:54:08
PackerVC8 -> Microsoft Corporation
PEhashf766cc9dfb2f13b8e24515b47d192711a8aefc47
IMPhashf33913baca71553da96a5b8d1f62b723
AVCA (E-Trust Ino)no_virus
AVF-SecureGen:Variant.Kazy.611782
AVDr. WebTrojan.Bayrob.5
AVClamAVno_virus
AVArcabit (arcavir)Gen:Variant.Kazy.611782
AVBullGuardGen:Variant.Kazy.611782
AVPadvishno_virus
AVVirusBlokAda (vba32)no_virus
AVCAT (quickheal)no_virus
AVTrend Microno_virus
AVKasperskyBackdoor.Win32.SoxGrave.azu
AVZillya!Backdoor.SoxGrave.Win32.448
AVEmsisoftGen:Variant.Kazy.611782
AVIkarusTrojan.Win32.Bayrob
AVFrisk (f-prot)no_virus
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVMalwareBytesno_virus
AVMicroWorld (escan)Gen:Variant.Kazy.611782
AVMicrosoft Security Essentialsno_virus
AVK7Trojan ( 004c77f41 )
AVBitDefenderGen:Variant.Kazy.611782
AVFortinetW32/Bayrob.X!tr
AVSymantecDownloader.Upatre!g15
AVGrisoft (avg)Win32/Cryptor
AVEset (nod32)Win32/Bayrob.Z
AVAlwil (avast)Dropper-OJQ [Drp]
AVAd-AwareGen:Variant.Kazy.611782
AVRisingno_virus
AVTwisterno_virus
AVAvira (antivir)TR/Crypt.Xpack.286535
AVMcafeeTrojan-FGIJ!0850D58906E9

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\snofwteo1kt5muapvfp5fne.exe
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\snofwteo1kt5muapvfp5fne.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\snofwteo1kt5muapvfp5fne.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Key ActiveX Remote Log Service ➝
C:\WINDOWS\system32\hljviqjvkn.exe
Creates FileC:\WINDOWS\system32\hljviqjvkn.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\lck
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\etc
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\hljviqjvkn.exe
Creates ServiceHost User-mode Presentation Smart Connectivity - C:\WINDOWS\system32\hljviqjvkn.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 812

Process
↳ Pid 860

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1144

Process
↳ C:\WINDOWS\system32\hljviqjvkn.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\run
Creates FileC:\WINDOWS\system32\feulsthl.exe
Creates FileC:\WINDOWS\TEMP\snofwteo1qyxmua.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\cfg
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\lck
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\rng
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\tst
Creates ProcessWATCHDOGPROC "c:\windows\system32\hljviqjvkn.exe"
Creates ProcessC:\WINDOWS\TEMP\snofwteo1qyxmua.exe -r 30984 tcp

Process
↳ C:\WINDOWS\system32\hljviqjvkn.exe

Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\hljviqjvkn.exe"

Creates FileC:\WINDOWS\system32\dtgtcrbagujmze\tst

Process
↳ C:\WINDOWS\TEMP\snofwteo1qyxmua.exe -r 30984 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSrecordsoldier.net
Type: A
208.91.197.241
DNSfliersurprise.net
Type: A
208.91.197.241
DNShistorybright.net
Type: A
208.91.197.241
DNSchiefsoldier.net
Type: A
208.91.197.241
DNSclasssurprise.net
Type: A
208.91.197.241
DNSthosecontinue.net
Type: A
208.91.197.241
DNSthroughcontain.net
Type: A
208.91.197.241
DNSbelongguard.net
Type: A
208.91.197.241
DNSmaybellinethaddeus.net
Type: A
208.91.197.241
DNSkimberleyshavonne.net
Type: A
208.91.197.241
DNSnaildeep.com
Type: A
74.220.215.218
DNSriddenstorm.net
Type: A
66.147.240.171
DNSdestroystorm.net
Type: A
216.239.138.86
DNSgladserve.net
Type: A
89.16.162.36
DNSgrouplive.net
Type: A
91.121.153.168
DNSvisitlive.net
Type: A
84.16.92.233
DNSwatchmine.net
Type: A
74.86.188.172
DNSfairserve.net
Type: A
184.95.49.118
DNSdreamhello.net
Type: A
195.22.26.248
DNSdreammine.net
Type: A
195.22.26.248
DNSdreamlive.net
Type: A
208.48.81.133
DNSdreamlive.net
Type: A
208.48.81.134
DNSdreamlive.net
Type: A
208.48.81.179
DNSdreamlive.net
Type: A
64.15.205.100
DNSdreamlive.net
Type: A
64.15.205.101
DNSthislive.net
Type: A
208.100.26.234
DNSdreamserve.net
Type: A
46.30.212.89
DNSsouthhouse.net
Type: A
116.126.87.124
DNSarivegift.net
Type: A
195.22.26.253
DNSarivegift.net
Type: A
195.22.26.254
DNSarivegift.net
Type: A
195.22.26.231
DNSarivegift.net
Type: A
195.22.26.252
DNSspothouse.net
Type: A
81.169.145.88
DNSsalthouse.net
Type: A
208.73.211.183
DNSsalthouse.net
Type: A
208.73.211.192
DNSsalthouse.net
Type: A
208.73.211.195
DNSsalthouse.net
Type: A
208.73.211.179
DNSgroupgift.net
Type: A
162.243.147.202
DNSequalpeace.net
Type: A
184.168.221.55
DNSgrouppeace.net
Type: A
50.63.202.60
DNSspokehouse.net
Type: A
202.124.241.178
DNShusbandfound.net
Type: A
DNSleadershort.net
Type: A
DNSeggbraker.com
Type: A
DNSithouneed.com
Type: A
DNSgladmine.net
Type: A
DNStakenmine.net
Type: A
DNSgladlive.net
Type: A
DNStakenlive.net
Type: A
DNStakenserve.net
Type: A
DNSequalhello.net
Type: A
DNSgrouphello.net
Type: A
DNSequalmine.net
Type: A
DNSgroupmine.net
Type: A
DNSequallive.net
Type: A
DNSequalserve.net
Type: A
DNSgroupserve.net
Type: A
DNSspokehello.net
Type: A
DNSvisithello.net
Type: A
DNSspokemine.net
Type: A
DNSvisitmine.net
Type: A
DNSspokelive.net
Type: A
DNSspokeserve.net
Type: A
DNSvisitserve.net
Type: A
DNSwatchhello.net
Type: A
DNSfairhello.net
Type: A
DNSfairmine.net
Type: A
DNSwatchlive.net
Type: A
DNSfairlive.net
Type: A
DNSwatchserve.net
Type: A
DNSthishello.net
Type: A
DNSthismine.net
Type: A
DNSthisserve.net
Type: A
DNSarivehouse.net
Type: A
DNSsouthgift.net
Type: A
DNSarivetuesday.net
Type: A
DNSsouthtuesday.net
Type: A
DNSarivepeace.net
Type: A
DNSsouthpeace.net
Type: A
DNSuponhouse.net
Type: A
DNSwhichhouse.net
Type: A
DNSupongift.net
Type: A
DNSwhichgift.net
Type: A
DNSupontuesday.net
Type: A
DNSwhichtuesday.net
Type: A
DNSuponpeace.net
Type: A
DNSwhichpeace.net
Type: A
DNSspotgift.net
Type: A
DNSsaltgift.net
Type: A
DNSspottuesday.net
Type: A
DNSsalttuesday.net
Type: A
DNSspotpeace.net
Type: A
DNSsaltpeace.net
Type: A
DNSgladhouse.net
Type: A
DNStakenhouse.net
Type: A
DNSgladgift.net
Type: A
DNStakengift.net
Type: A
DNSgladtuesday.net
Type: A
DNStakentuesday.net
Type: A
DNSgladpeace.net
Type: A
DNStakenpeace.net
Type: A
DNSequalhouse.net
Type: A
DNSgrouphouse.net
Type: A
DNSequalgift.net
Type: A
DNSequaltuesday.net
Type: A
DNSgrouptuesday.net
Type: A
DNSvisithouse.net
Type: A
DNSspokegift.net
Type: A
DNSvisitgift.net
Type: A
DNSspoketuesday.net
Type: A
DNSvisittuesday.net
Type: A
DNSspokepeace.net
Type: A
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://gladserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://grouplive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://visitlive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://watchmine.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://fairserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamhello.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreammine.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamlive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://thislive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://southhouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://arivegift.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://spothouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://salthouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://groupgift.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://equalpeace.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://grouppeace.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://spokehouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://recordsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://fliersurprise.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://historybright.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://chiefsoldier.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://classsurprise.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://thosecontinue.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://throughcontain.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://belongguard.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://maybellinethaddeus.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://kimberleyshavonne.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://naildeep.com/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://riddenstorm.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://destroystorm.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://gladserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://grouplive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://visitlive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://watchmine.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://fairserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamhello.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreammine.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamlive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://thislive.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://dreamserve.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://southhouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://arivegift.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://spothouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://salthouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://groupgift.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://equalpeace.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://grouppeace.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
HTTP GEThttp://spokehouse.net/index.php?method=validate&mode=sox&v=050&sox=4fad9e00&lenhdr
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1045 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1046 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1047 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1048 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1049 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1050 ➝ 89.16.162.36:80
Flows TCP192.168.1.1:1051 ➝ 91.121.153.168:80
Flows TCP192.168.1.1:1052 ➝ 84.16.92.233:80
Flows TCP192.168.1.1:1053 ➝ 74.86.188.172:80
Flows TCP192.168.1.1:1054 ➝ 184.95.49.118:80
Flows TCP192.168.1.1:1055 ➝ 195.22.26.248:80
Flows TCP192.168.1.1:1056 ➝ 195.22.26.248:80
Flows TCP192.168.1.1:1057 ➝ 208.48.81.133:80
Flows TCP192.168.1.1:1058 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1059 ➝ 46.30.212.89:80
Flows TCP192.168.1.1:1060 ➝ 116.126.87.124:80
Flows TCP192.168.1.1:1061 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1062 ➝ 81.169.145.88:80
Flows TCP192.168.1.1:1063 ➝ 208.73.211.183:80
Flows TCP192.168.1.1:1064 ➝ 162.243.147.202:80
Flows TCP192.168.1.1:1065 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1066 ➝ 50.63.202.60:80
Flows TCP192.168.1.1:1067 ➝ 202.124.241.178:80
Flows TCP192.168.1.1:1068 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1069 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1070 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1071 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1072 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1073 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1074 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1075 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1076 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1077 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1078 ➝ 74.220.215.218:80
Flows TCP192.168.1.1:1079 ➝ 66.147.240.171:80
Flows TCP192.168.1.1:1080 ➝ 216.239.138.86:80
Flows TCP192.168.1.1:1081 ➝ 89.16.162.36:80
Flows TCP192.168.1.1:1082 ➝ 91.121.153.168:80
Flows TCP192.168.1.1:1083 ➝ 84.16.92.233:80
Flows TCP192.168.1.1:1084 ➝ 74.86.188.172:80
Flows TCP192.168.1.1:1085 ➝ 184.95.49.118:80
Flows TCP192.168.1.1:1086 ➝ 195.22.26.248:80
Flows TCP192.168.1.1:1087 ➝ 195.22.26.248:80
Flows TCP192.168.1.1:1088 ➝ 208.48.81.133:80
Flows TCP192.168.1.1:1089 ➝ 208.100.26.234:80
Flows TCP192.168.1.1:1090 ➝ 46.30.212.89:80
Flows TCP192.168.1.1:1091 ➝ 116.126.87.124:80
Flows TCP192.168.1.1:1092 ➝ 195.22.26.253:80
Flows TCP192.168.1.1:1093 ➝ 81.169.145.88:80
Flows TCP192.168.1.1:1094 ➝ 208.73.211.183:80
Flows TCP192.168.1.1:1095 ➝ 162.243.147.202:80
Flows TCP192.168.1.1:1096 ➝ 184.168.221.55:80
Flows TCP192.168.1.1:1097 ➝ 50.63.202.60:80
Flows TCP192.168.1.1:1098 ➝ 202.124.241.178:80

Raw Pcap

Strings