Windows
Analysis Report
QsKtlzYaKF.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- QsKtlzYaKF.exe (PID: 6856 cmdline:
C:\Users\u ser\Deskto p\QsKtlzYa KF.exe MD5: 85AA59199316A48AE26E32A9A674D2AE) - netsh.exe (PID: 7044 cmdline:
netsh fire wall add a llowedprog ram "C:\Us ers\user\D esktop\QsK tlzYaKF.ex e" "QsKtlz YaKF.exe" ENABLE MD5: 4E89A1A088BE715D6C946E55AB07C7DF) - conhost.exe (PID: 7072 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- QsKtlzYaKF.exe (PID: 4284 cmdline:
"C:\Users\ user\Deskt op\QsKtlzY aKF.exe" . . MD5: 85AA59199316A48AE26E32A9A674D2AE)
- QsKtlzYaKF.exe (PID: 6184 cmdline:
"C:\Users\ user\Deskt op\QsKtlzY aKF.exe" . . MD5: 85AA59199316A48AE26E32A9A674D2AE)
- QsKtlzYaKF.exe (PID: 1608 cmdline:
"C:\Users\ user\Deskt op\QsKtlzY aKF.exe" . . MD5: 85AA59199316A48AE26E32A9A674D2AE)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
NjRAT | RedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored. |
{"Host": "6.tcp.eu.ngrok.io", "Port": "19220", "Version": "im523", "Campaign ID": "mark", "Install Name": "server.exe", "Install Dir": "TEMP"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
MALWARE_Win_NjRAT | Detects NjRAT / Bladabindi | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
MALWARE_Win_NjRAT | Detects NjRAT / Bladabindi | ditekSHen |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
JoeSecurity_Njrat | Yara detected Njrat | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Njrat | Yara detected Njrat | Joe Security | ||
Windows_Trojan_Njrat_30f3c220 | unknown | unknown |
| |
njrat1 | Identify njRat | Brian Wallace @botnet_hunter |
| |
MALWARE_Win_NjRAT | Detects NjRAT / Bladabindi | ditekSHen |
|
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp: | 192.168.2.452.28.247.25549739192202814860 12/03/23-20:22:51.251780 |
SID: | 2814860 |
Source Port: | 49739 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749746192202033132 12/03/23-20:24:22.591862 |
SID: | 2033132 |
Source Port: | 49746 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049730192202825563 12/03/23-20:21:23.688164 |
SID: | 2825563 |
Source Port: | 49730 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049729192202814856 12/03/23-20:21:17.448214 |
SID: | 2814856 |
Source Port: | 49729 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749748192202825564 12/03/23-20:25:13.193068 |
SID: | 2825564 |
Source Port: | 49748 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749748192202825563 12/03/23-20:24:57.283768 |
SID: | 2825563 |
Source Port: | 49748 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549739192202033132 12/03/23-20:22:42.761128 |
SID: | 2033132 |
Source Port: | 49739 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749747192202825563 12/03/23-20:24:37.860433 |
SID: | 2825563 |
Source Port: | 49747 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749746192202825563 12/03/23-20:24:22.776536 |
SID: | 2825563 |
Source Port: | 49746 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749746192202825564 12/03/23-20:24:29.426575 |
SID: | 2825564 |
Source Port: | 49746 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049737192202033132 12/03/23-20:22:05.018671 |
SID: | 2033132 |
Source Port: | 49737 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549741192202825563 12/03/23-20:23:14.946007 |
SID: | 2825563 |
Source Port: | 49741 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549740192202825563 12/03/23-20:22:53.706955 |
SID: | 2825563 |
Source Port: | 49740 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549742192202825563 12/03/23-20:23:26.344895 |
SID: | 2825563 |
Source Port: | 49742 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549740192202825564 12/03/23-20:22:59.051727 |
SID: | 2825564 |
Source Port: | 49740 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549742192202825564 12/03/23-20:23:30.911166 |
SID: | 2825564 |
Source Port: | 49742 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049729192202033132 12/03/23-20:21:17.262929 |
SID: | 2033132 |
Source Port: | 49729 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549743192202825563 12/03/23-20:23:37.605690 |
SID: | 2825563 |
Source Port: | 49743 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849744192202825564 12/03/23-20:24:02.368608 |
SID: | 2825564 |
Source Port: | 49744 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849744192202825563 12/03/23-20:23:48.158065 |
SID: | 2825563 |
Source Port: | 49744 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049729192202825563 12/03/23-20:21:17.448214 |
SID: | 2825563 |
Source Port: | 49729 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549743192202825564 12/03/23-20:23:40.973464 |
SID: | 2825564 |
Source Port: | 49743 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849745192202825563 12/03/23-20:24:12.746923 |
SID: | 2825563 |
Source Port: | 49745 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049737192202825564 12/03/23-20:22:34.323672 |
SID: | 2825564 |
Source Port: | 49737 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849745192202825564 12/03/23-20:24:13.178120 |
SID: | 2825564 |
Source Port: | 49745 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049737192202825563 12/03/23-20:22:05.210462 |
SID: | 2825563 |
Source Port: | 49737 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549741192202825564 12/03/23-20:23:15.348399 |
SID: | 2825564 |
Source Port: | 49741 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049737192202814856 12/03/23-20:22:05.210462 |
SID: | 2814856 |
Source Port: | 49737 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749748192202814856 12/03/23-20:24:57.283768 |
SID: | 2814856 |
Source Port: | 49748 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549743192202814856 12/03/23-20:23:37.605690 |
SID: | 2814856 |
Source Port: | 49743 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549742192202814856 12/03/23-20:23:26.344895 |
SID: | 2814856 |
Source Port: | 49742 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049730192202814856 12/03/23-20:21:23.688164 |
SID: | 2814856 |
Source Port: | 49730 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549741192202814856 12/03/23-20:23:14.946007 |
SID: | 2814856 |
Source Port: | 49741 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549740192202814856 12/03/23-20:22:53.706955 |
SID: | 2814856 |
Source Port: | 49740 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749747192202814856 12/03/23-20:24:37.860433 |
SID: | 2814856 |
Source Port: | 49747 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849744192202814860 12/03/23-20:24:03.120602 |
SID: | 2814860 |
Source Port: | 49744 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849745192202814860 12/03/23-20:24:13.178120 |
SID: | 2814860 |
Source Port: | 49745 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849745192202033132 12/03/23-20:24:12.557531 |
SID: | 2033132 |
Source Port: | 49745 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049737192202814860 12/03/23-20:22:39.270213 |
SID: | 2814860 |
Source Port: | 49737 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749746192202814856 12/03/23-20:24:22.776536 |
SID: | 2814856 |
Source Port: | 49746 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549742192202033132 12/03/23-20:23:26.153978 |
SID: | 2033132 |
Source Port: | 49742 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549743192202033132 12/03/23-20:23:37.416476 |
SID: | 2033132 |
Source Port: | 49743 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549739192202814856 12/03/23-20:22:43.464095 |
SID: | 2814856 |
Source Port: | 49739 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549740192202033132 12/03/23-20:22:53.517449 |
SID: | 2033132 |
Source Port: | 49740 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849744192202033132 12/03/23-20:23:47.970103 |
SID: | 2033132 |
Source Port: | 49744 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749746192202814860 12/03/23-20:24:29.426575 |
SID: | 2814860 |
Source Port: | 49746 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849744192202814856 12/03/23-20:23:48.158065 |
SID: | 2814856 |
Source Port: | 49744 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.115.17849745192202814856 12/03/23-20:24:12.746923 |
SID: | 2814856 |
Source Port: | 49745 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549740192202814860 12/03/23-20:22:59.051727 |
SID: | 2814860 |
Source Port: | 49740 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549742192202814860 12/03/23-20:23:30.911166 |
SID: | 2814860 |
Source Port: | 49742 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749747192202033132 12/03/23-20:24:37.669337 |
SID: | 2033132 |
Source Port: | 49747 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549743192202814860 12/03/23-20:23:40.973464 |
SID: | 2814860 |
Source Port: | 49743 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549741192202033132 12/03/23-20:23:14.759488 |
SID: | 2033132 |
Source Port: | 49741 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749748192202033132 12/03/23-20:24:57.092638 |
SID: | 2033132 |
Source Port: | 49748 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.69.157.22049730192202033132 12/03/23-20:21:23.501095 |
SID: | 2033132 |
Source Port: | 49730 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.452.28.247.25549741192202814860 12/03/23-20:23:15.348399 |
SID: | 2814860 |
Source Port: | 49741 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.43.66.38.11749748192202814860 12/03/23-20:25:13.193068 |
SID: | 2814860 |
Source Port: | 49748 |
Destination Port: | 19220 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | Avira: | ||
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Spreading |
---|
Source: | File created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | URLs: |
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_0173BE26 | |
Source: | Code function: | 0_2_0173BE04 | |
Source: | Code function: | 0_2_0576019E | |
Source: | Code function: | 0_2_05760163 |
Source: | Process Stats: |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_0173BAD6 | |
Source: | Code function: | 0_2_0173BA9F |
Source: | File created: | Jump to behavior |
Source: | Classification label: |
Source: | Static file information: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file |
Source: | Registry value created or modified: | Jump to behavior |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Lowering of HIPS / PFW / Operating System Security Settings |
---|
Source: | Process created: |
Source: | Process created: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact | Resource Development | Reconnaissance |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11 Replication Through Removable Media | 1 Native API | 221 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 11 Masquerading | 1 Input Capture | 11 Security Software Discovery | 11 Replication Through Removable Media | 1 Input Capture | Exfiltration Over Other Network Medium | 1 Non-Standard Port | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Abuse Accessibility Features | Acquire Infrastructure | Gather Victim Identity Information |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 2 Process Injection | 21 Disable or Modify Tools | LSASS Memory | 2 Process Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | 1 Non-Application Layer Protocol | SIM Card Swap | Obtain Device Cloud Backups | Network Denial of Service | Domains | Credentials |
Domain Accounts | At | Logon Script (Windows) | 221 Registry Run Keys / Startup Folder | 21 Virtualization/Sandbox Evasion | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | 11 Application Layer Protocol | Data Encrypted for Impact | DNS Server | Email Addresses | ||
Local Accounts | Cron | Login Hook | Login Hook | 1 Access Token Manipulation | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Traffic Duplication | Protocol Impersonation | Data Destruction | Virtual Private Server | Employee Names | ||
Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 2 Process Injection | LSA Secrets | 1 Peripheral Device Discovery | SSH | Keylogging | Scheduled Transfer | Fallback Channels | Data Encrypted for Impact | Server | Gather Victim Network Information | ||
Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 12 System Information Discovery | VNC | GUI Input Capture | Data Transfer Size Limits | Multiband Communication | Service Stop | Botnet | Domain Properties |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
81% | Virustotal | Browse | ||
86% | ReversingLabs | ByteCode-MSIL.Trojan.NjRAT | ||
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/ATRAPS.Gen | ||
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
86% | ReversingLabs | ByteCode-MSIL.Trojan.NjRAT | ||
81% | Virustotal | Browse | ||
86% | ReversingLabs | ByteCode-MSIL.Trojan.NjRAT | ||
81% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
11% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
11% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
6.tcp.eu.ngrok.io | 3.69.157.220 | true | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
3.66.38.117 | unknown | United States | 16509 | AMAZON-02US | true | |
52.28.247.255 | unknown | United States | 16509 | AMAZON-02US | true | |
3.69.115.178 | unknown | United States | 16509 | AMAZON-02US | true | |
3.69.157.220 | 6.tcp.eu.ngrok.io | United States | 16509 | AMAZON-02US | true |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1352747 |
Start date and time: | 2023-12-03 20:20:17 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 28s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample file name: | QsKtlzYaKF.exerenamed because original name is a hash value |
Original Sample Name: | 85AA59199316A48AE26E32A9A674D2AE.exe |
Detection: | MAL |
Classification: | mal100.spre.troj.adwa.spyw.evad.winEXE@7/7@4/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
Time | Type | Description |
---|---|---|
19:21:14 | Autostart | |
19:21:24 | Autostart | |
19:21:32 | Autostart | |
19:21:43 | Autostart | |
20:21:50 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3.66.38.117 | Get hash | malicious | Njrat | Browse | ||
Get hash | malicious | AsyncRAT, DcRat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Quasar | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
52.28.247.255 | Get hash | malicious | Njrat | Browse | ||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Quasar | Browse | |||
Get hash | malicious | njRat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Njrat | Browse | |||
Get hash | malicious | njRat | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
6.tcp.eu.ngrok.io | Get hash | malicious | Njrat | Browse |
| |
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | AsyncRAT, DcRat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Njrat | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AMAZON-02US | Get hash | malicious | Njrat | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
| ||
AMAZON-02US | Get hash | malicious | Njrat | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Njrat | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | RedLine, SmokeLoader | Browse |
|
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 525 |
Entropy (8bit): | 5.259753436570609 |
Encrypted: | false |
SSDEEP: | 12:Q3LaJU2C9XAn10Ug+9pfu9t0U29xtUz1B0U2uk71K6xhk7v:MLF2CpI3zffup29Iz52Ve |
MD5: | 260E01CC001F9C4643CA7A62F395D747 |
SHA1: | 492AD0ACE3A9C8736909866EEA168962D418BE5A |
SHA-256: | 4BC52CCF866F489772A6919A0CC2C55B1432729D6BDF29E17E5853ABDFAB6030 |
SHA-512: | 01AF7D75257E3DBD460E328F5C057D0367B83D3D9397E89CA3AE54AB9B2842D62352D8CCB4BE98ACE0C5667846759D32C199DE39ECCD0CF9CD6A83267D27E7C4 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe
Download File
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.101513159941245 |
Encrypted: | false |
SSDEEP: | 384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf |
MD5: | 85AA59199316A48AE26E32A9A674D2AE |
SHA1: | E7EBF981BC84C76FDB0F7B77F4067212FF70421D |
SHA-256: | 04009681685F9366286233D718166FF7DE75C6149ABA12FB4E913DAA52FFB445 |
SHA-512: | 88A5571C84B64FAD280173FA4859B4FF915019C47AD67F36971703EC3764A54BDB0CF669F207F98604FF363C0E24AE203AE6F0859F331D8BCEF225DFCF7C99DF |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a502d6936d522819db45a43677dc3f7c.exe:Zone.Identifier
Download File
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 50 |
Entropy (8bit): | 4.320240000427043 |
Encrypted: | false |
SSDEEP: | 3:It1KV2LKMACovK0x:e1KzxvD |
MD5: | 5B0B50BADE67C5EC92D42E971287A5D9 |
SHA1: | 90D5C99143E7A56AD6E5EE401015F8ECC093D95A |
SHA-256: | 04DDE2489D2D2E6846D42250D813AB90B5CA847D527F8F2C022E6C327DC6DB53 |
SHA-512: | C064DC3C4185A38D1CAEBD069ACB9FDBB85DFB650D6A241036E501A09BC89FD06E267BE9D400D20E6C14B4068473D1C6557962E8D82FDFD191DB7EABB6E66821 |
Malicious: | true |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 6.101513159941245 |
Encrypted: | false |
SSDEEP: | 384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf |
MD5: | 85AA59199316A48AE26E32A9A674D2AE |
SHA1: | E7EBF981BC84C76FDB0F7B77F4067212FF70421D |
SHA-256: | 04009681685F9366286233D718166FF7DE75C6149ABA12FB4E913DAA52FFB445 |
SHA-512: | 88A5571C84B64FAD280173FA4859B4FF915019C47AD67F36971703EC3764A54BDB0CF669F207F98604FF363C0E24AE203AE6F0859F331D8BCEF225DFCF7C99DF |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\netsh.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 313 |
Entropy (8bit): | 4.971939296804078 |
Encrypted: | false |
SSDEEP: | 6:/ojfKsUTGN8Ypox42k9L+DbGMKeQE+vigqAZs2E+AYeDPO+Yswyha:wjPIGNrkHk9iaeIM6ADDPOHyha |
MD5: | 689E2126A85BF55121488295EE068FA1 |
SHA1: | 09BAAA253A49D80C18326DFBCA106551EBF22DD6 |
SHA-256: | D968A966EF474068E41256321F77807A042F1965744633D37A203A705662EC25 |
SHA-512: | C3736A8FC7E6573FA1B26FE6A901C05EE85C55A4A276F8F569D9EADC9A58BEC507D1BB90DBF9EA62AE79A6783178C69304187D6B90441D82E46F5F56172B5C5C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.101513159941245 |
TrID: |
|
File name: | QsKtlzYaKF.exe |
File size: | 105'472 bytes |
MD5: | 85aa59199316a48ae26e32a9a674d2ae |
SHA1: | e7ebf981bc84c76fdb0f7b77f4067212ff70421d |
SHA256: | 04009681685f9366286233d718166ff7de75c6149aba12fb4e913daa52ffb445 |
SHA512: | 88a5571c84b64fad280173fa4859b4ff915019c47ad67f36971703ec3764a54bdb0cf669f207f98604ff363c0e24ae203ae6f0859f331d8bcef225dfcf7c99df |
SSDEEP: | 384:89uBz6dgibXjpPu7w9qyMTA3/r6s2cLrrAF+rMRTyN/0L+EcoinblneHQM3epzXh:5+NN9ZMTA3W1cvrM+rMRa8NuZqtxcf |
TLSH: | 51A38244DB40BD4FE2FA75718E161F9847B27125CC6927142BFAC6DF0B9EA015E20BE2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ee................................. ........@.. ....................................@................................ |
Icon Hash: | 6d92b28e8696d069 |
Entrypoint: | 0x40abce |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6565EEBD [Tue Nov 28 13:44:29 2023 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xab74 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xc000 | 0x10b0c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1e000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x8bd4 | 0x8c00 | False | 0.46378348214285714 | data | 5.608042578085843 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xc000 | 0x10b0c | 0x10c00 | False | 0.07984491604477612 | data | 5.827905252515968 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x1e000 | 0xc | 0x200 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xc0e8 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | 0.07501774517922631 | ||
RT_GROUP_ICON | 0x1c910 | 0x14 | data | 1.0 | ||
RT_MANIFEST | 0x1c924 | 0x1e7 | XML 1.0 document, ASCII text, with CRLF line terminators | 0.5338809034907598 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
192.168.2.452.28.247.25549739192202814860 12/03/23-20:22:51.251780 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749746192202033132 12/03/23-20:24:22.591862 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.69.157.22049730192202825563 12/03/23-20:21:23.688164 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.43.69.157.22049729192202814856 12/03/23-20:21:17.448214 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.43.66.38.11749748192202825564 12/03/23-20:25:13.193068 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.66.38.11749748192202825563 12/03/23-20:24:57.283768 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.452.28.247.25549739192202033132 12/03/23-20:22:42.761128 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749747192202825563 12/03/23-20:24:37.860433 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.66.38.11749746192202825563 12/03/23-20:24:22.776536 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.66.38.11749746192202825564 12/03/23-20:24:29.426575 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.69.157.22049737192202033132 12/03/23-20:22:05.018671 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549741192202825563 12/03/23-20:23:14.946007 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549740192202825563 12/03/23-20:22:53.706955 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549742192202825563 12/03/23-20:23:26.344895 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549740192202825564 12/03/23-20:22:59.051727 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549742192202825564 12/03/23-20:23:30.911166 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.157.22049729192202033132 12/03/23-20:21:17.262929 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549743192202825563 12/03/23-20:23:37.605690 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.115.17849744192202825564 12/03/23-20:24:02.368608 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.115.17849744192202825563 12/03/23-20:23:48.158065 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.157.22049729192202825563 12/03/23-20:21:17.448214 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549743192202825564 12/03/23-20:23:40.973464 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.115.17849745192202825563 12/03/23-20:24:12.746923 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.157.22049737192202825564 12/03/23-20:22:34.323672 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.43.69.115.17849745192202825564 12/03/23-20:24:13.178120 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.157.22049737192202825563 12/03/23-20:22:05.210462 | TCP | 2825563 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (inf) | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549741192202825564 12/03/23-20:23:15.348399 | TCP | 2825564 | ETPRO TROJAN Generic njRAT/Bladabindi CnC Activity (act) | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.157.22049737192202814856 12/03/23-20:22:05.210462 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.43.66.38.11749748192202814856 12/03/23-20:24:57.283768 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.452.28.247.25549743192202814856 12/03/23-20:23:37.605690 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549742192202814856 12/03/23-20:23:26.344895 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.157.22049730192202814856 12/03/23-20:21:23.688164 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549741192202814856 12/03/23-20:23:14.946007 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549740192202814856 12/03/23-20:22:53.706955 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749747192202814856 12/03/23-20:24:37.860433 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.69.115.17849744192202814860 12/03/23-20:24:03.120602 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.115.17849745192202814860 12/03/23-20:24:13.178120 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.115.17849745192202033132 12/03/23-20:24:12.557531 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.157.22049737192202814860 12/03/23-20:22:39.270213 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.43.66.38.11749746192202814856 12/03/23-20:24:22.776536 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.452.28.247.25549742192202033132 12/03/23-20:23:26.153978 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549743192202033132 12/03/23-20:23:37.416476 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549739192202814856 12/03/23-20:22:43.464095 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549740192202033132 12/03/23-20:22:53.517449 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.69.115.17849744192202033132 12/03/23-20:23:47.970103 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.66.38.11749746192202814860 12/03/23-20:24:29.426575 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.69.115.17849744192202814856 12/03/23-20:23:48.158065 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.43.69.115.17849745192202814856 12/03/23-20:24:12.746923 | TCP | 2814856 | ETPRO TROJAN njrat ver 0.7d Malware CnC Callback (inf) | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
192.168.2.452.28.247.25549740192202814860 12/03/23-20:22:59.051727 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549742192202814860 12/03/23-20:23:30.911166 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749747192202033132 12/03/23-20:24:37.669337 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.452.28.247.25549743192202814860 12/03/23-20:23:40.973464 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.452.28.247.25549741192202033132 12/03/23-20:23:14.759488 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749748192202033132 12/03/23-20:24:57.092638 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
192.168.2.43.69.157.22049730192202033132 12/03/23-20:21:23.501095 | TCP | 2033132 | ET TROJAN Generic njRAT/Bladabindi CnC Activity (ll) | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
192.168.2.452.28.247.25549741192202814860 12/03/23-20:23:15.348399 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
192.168.2.43.66.38.11749748192202814860 12/03/23-20:25:13.193068 | TCP | 2814860 | ETPRO TROJAN njRAT/Bladabindi CnC Callback (act) | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 3, 2023 20:21:16.949775934 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:17.134910107 CET | 19220 | 49729 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:17.135025978 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:17.262928963 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:17.448121071 CET | 19220 | 49729 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:17.448214054 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:17.633409023 CET | 19220 | 49729 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:21.268573999 CET | 19220 | 49729 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:21.317231894 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.307272911 CET | 49729 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.309146881 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.496160030 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:23.496252060 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.501095057 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.688019037 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:23.688163996 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:23.875531912 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:38.882241964 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:38.882302999 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:54.106287956 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:54.106359959 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:55.754508018 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:55.754642010 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:56.372534990 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:56.372643948 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:56.919554949 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:21:56.919667006 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:57.770504951 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:57.772375107 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:58.192100048 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:58.786004066 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:59.020189047 CET | 49730 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:21:59.210483074 CET | 19220 | 49730 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:00.801556110 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:04.817079067 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:05.013024092 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:05.013180017 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:05.018671036 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:05.210298061 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:05.210462093 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:05.440330982 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:07.473679066 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:07.973304987 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:08.165543079 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:12.989212036 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:13.179318905 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:14.822344065 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:15.270222902 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:15.466408014 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:20.802325010 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:20.989144087 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:21.052205086 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:21.442179918 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:21.630619049 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:22.270541906 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:22.660804987 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:22.852292061 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:22.956238985 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:23.143481970 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:23.143630981 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:23.333961010 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:23.334083080 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:23.645296097 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:23.915687084 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:23.915954113 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:24.223280907 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:24.413630962 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:24.413908005 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:24.602298021 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:24.602399111 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:24.792716980 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:24.792851925 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:25.098526001 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:25.288453102 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:25.288737059 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:25.598288059 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:25.910887957 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:26.166167021 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:26.166420937 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:26.402553082 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:26.402745008 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:26.707741976 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:27.020246983 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:27.629523993 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:27.825870991 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:27.825995922 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:28.016659975 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:28.016915083 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:28.317030907 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:28.506978989 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:28.507194996 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:28.817128897 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:29.129551888 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:29.738996983 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:30.942008018 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:32.145179033 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:33.348423004 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:33.535439968 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:33.535578966 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:33.726258993 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:33.726280928 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:33.726432085 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:33.928352118 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:33.928369045 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:33.928611994 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:34.119138002 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:34.119153023 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:34.119497061 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:34.320122957 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:34.323672056 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:34.629626989 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:34.942003012 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:35.551486969 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:36.679214001 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:36.770126104 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:36.869585991 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:37.311872005 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:37.312237024 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:37.972639084 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:37.972867966 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:38.586900949 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:38.587107897 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:39.270212889 CET | 49737 | 19220 | 192.168.2.4 | 3.69.157.220 |
Dec 3, 2023 20:22:39.460273981 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:39.462500095 CET | 19220 | 49737 | 3.69.157.220 | 192.168.2.4 |
Dec 3, 2023 20:22:40.567006111 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:42.566996098 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:42.758126974 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:42.758285046 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:42.761127949 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:43.464095116 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:43.765878916 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:43.765963078 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:45.770144939 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:45.781192064 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:45.781469107 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:45.960856915 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:48.770220041 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:48.960946083 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:48.961095095 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.151853085 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.151949883 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.151979923 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.151981115 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.152045012 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.342631102 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.342654943 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.342668056 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.343024969 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.533610106 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.533626080 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.533787966 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.724266052 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.724348068 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:49.914793015 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:49.914922953 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:50.105473995 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:50.105592966 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:50.296475887 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:50.296597958 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:50.487565041 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:50.487714052 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:50.678436041 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:50.678685904 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:50.870069027 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:50.870312929 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:51.060883999 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:51.060991049 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:51.251543999 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:51.251780033 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:51.294357061 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:51.364042997 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:51.442313910 CET | 19220 | 49739 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:53.317111015 CET | 49739 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:53.319341898 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:53.508790970 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:53.508929014 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:53.517448902 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:53.706727028 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:53.706954956 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:53.896482944 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:22:59.051727057 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:22:59.242485046 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:12.550096035 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:12.553606033 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:14.567168951 CET | 49740 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:14.569583893 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:14.756047964 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:14.756153107 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:14.756515026 CET | 19220 | 49740 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:14.759488106 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:14.945910931 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:14.946007013 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:15.132476091 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:15.348398924 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:15.535921097 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:23.953702927 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:23.953886032 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:25.957556009 CET | 49741 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:25.960640907 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:26.144543886 CET | 19220 | 49741 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:26.151465893 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:26.151573896 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:26.153978109 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:26.344763041 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:26.344894886 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:26.535407066 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:30.911165953 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:31.102243900 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:35.220310926 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:35.220398903 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.223190069 CET | 49742 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.225099087 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.413831949 CET | 19220 | 49742 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:37.414048910 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:37.414171934 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.416476011 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.605428934 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:37.605690002 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:37.794634104 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:40.973464012 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:41.163177967 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:45.639605999 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:45.639770031 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:47.645221949 CET | 49743 | 19220 | 192.168.2.4 | 52.28.247.255 |
Dec 3, 2023 20:23:47.778893948 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:47.834372044 CET | 19220 | 49743 | 52.28.247.255 | 192.168.2.4 |
Dec 3, 2023 20:23:47.966825962 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:47.966962099 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:47.970103025 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:48.157918930 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:48.158065081 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:48.345854044 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:48.848876953 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:49.036758900 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:50.379810095 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:50.567684889 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:54.879775047 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:55.067888021 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:55.129679918 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:55.317837000 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:56.676548004 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:56.864823103 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:56.864995956 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:57.052654028 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:57.274096966 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:57.461885929 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:57.461976051 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:57.650003910 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:57.650407076 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:57.838366985 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:57.838587046 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.026408911 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.026501894 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.214497089 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.214557886 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.402410984 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.402560949 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.592919111 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.593038082 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.780709028 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.780796051 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:58.971077919 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:58.971215010 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:59.161885023 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:59.162148952 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:59.352740049 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:59.353081942 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:59.540802956 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:59.541050911 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:59.734560966 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:59.734832048 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:23:59.923034906 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:23:59.923295021 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:00.111478090 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:00.111562014 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:00.299525023 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:00.299715996 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:00.487644911 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:00.487771988 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:00.675805092 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:00.675987959 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:00.863692045 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:00.863795996 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.051656008 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.051767111 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.239571095 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.239680052 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.427635908 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.427762032 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.615495920 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.615741968 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.803407907 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.803620100 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:01.991267920 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:01.991456985 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:02.180299044 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:02.180401087 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:02.368284941 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:02.368607998 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:02.556571007 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:02.556754112 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:02.744575977 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:02.744684935 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:02.932421923 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:02.932637930 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:03.120343924 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:03.120601892 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:03.308280945 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:10.356204987 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:10.356293917 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.363707066 CET | 49744 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.365601063 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.551891088 CET | 19220 | 49744 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:12.554701090 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:12.554819107 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.557531118 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.746862888 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:12.746922970 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:12.936227083 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:13.178119898 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:13.367867947 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:20.247921944 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:20.248073101 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:22.254416943 CET | 49745 | 19220 | 192.168.2.4 | 3.69.115.178 |
Dec 3, 2023 20:24:22.403251886 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:22.443695068 CET | 19220 | 49745 | 3.69.115.178 | 192.168.2.4 |
Dec 3, 2023 20:24:22.588119984 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:22.588332891 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:22.591861963 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:22.776458025 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:22.776535988 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:22.961366892 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:29.426574945 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:29.611269951 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:35.461355925 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:35.461476088 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:37.473115921 CET | 49746 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:37.475626945 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:37.657643080 CET | 19220 | 49746 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:37.666692019 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:37.666918993 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:37.669337034 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:37.860342026 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:37.860433102 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:38.052303076 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:53.056881905 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:53.056994915 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:54.888999939 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:54.889108896 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:56.894916058 CET | 49747 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:56.897814989 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:57.086370945 CET | 19220 | 49747 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:57.088749886 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:57.088845968 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:57.092638016 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:57.283690929 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:57.283767939 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:57.474797964 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:24:57.910748959 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:24:58.102027893 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:00.942502975 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:01.133606911 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:01.975742102 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:02.167280912 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:05.349498034 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:05.540647030 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:05.540735006 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:05.732065916 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:06.598191977 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:06.789596081 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:06.789690971 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:06.981138945 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:06.981232882 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:07.172255993 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:07.172365904 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:07.363415956 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:07.363632917 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:07.554811001 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:07.554912090 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:07.746007919 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:07.746174097 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:07.937393904 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:07.937505960 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:08.128639936 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:08.128767967 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:08.319890022 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:08.319974899 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:08.511137962 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:08.511254072 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:08.702349901 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:08.702469110 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:08.893496037 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:08.893584013 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:09.084820032 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:09.084924936 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:09.276422977 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:09.276628017 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:09.467864990 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:09.467957020 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:09.659207106 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:09.659342051 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:09.850552082 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:09.850660086 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.042017937 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.042164087 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.233202934 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.233304977 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.424410105 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.424628973 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.616070032 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.616204977 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.807468891 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.807693958 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:10.998960018 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:10.999052048 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:11.190244913 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:11.190496922 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:11.381627083 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:11.381701946 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:11.572830915 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:11.572973967 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:11.764123917 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:11.852426052 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:12.043586969 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:12.043672085 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:12.234942913 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:12.235169888 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:12.426347017 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:12.427202940 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:12.618493080 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:12.619110107 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:12.810370922 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:13.001749039 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:13.192990065 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Dec 3, 2023 20:25:13.193068027 CET | 49748 | 19220 | 192.168.2.4 | 3.66.38.117 |
Dec 3, 2023 20:25:13.384098053 CET | 19220 | 49748 | 3.66.38.117 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 3, 2023 20:21:16.808505058 CET | 61612 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 3, 2023 20:21:16.946496964 CET | 53 | 61612 | 1.1.1.1 | 192.168.2.4 |
Dec 3, 2023 20:22:39.320367098 CET | 64416 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 3, 2023 20:22:39.458174944 CET | 53 | 64416 | 1.1.1.1 | 192.168.2.4 |
Dec 3, 2023 20:23:47.646611929 CET | 56642 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 3, 2023 20:23:47.777641058 CET | 53 | 56642 | 1.1.1.1 | 192.168.2.4 |
Dec 3, 2023 20:24:22.255919933 CET | 58031 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 3, 2023 20:24:22.401644945 CET | 53 | 58031 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 3, 2023 20:21:16.808505058 CET | 192.168.2.4 | 1.1.1.1 | 0x5cd6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 3, 2023 20:22:39.320367098 CET | 192.168.2.4 | 1.1.1.1 | 0x64d9 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 3, 2023 20:23:47.646611929 CET | 192.168.2.4 | 1.1.1.1 | 0x9b01 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 3, 2023 20:24:22.255919933 CET | 192.168.2.4 | 1.1.1.1 | 0xab51 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 3, 2023 20:21:16.946496964 CET | 1.1.1.1 | 192.168.2.4 | 0x5cd6 | No error (0) | 3.69.157.220 | A (IP address) | IN (0x0001) | false | ||
Dec 3, 2023 20:22:39.458174944 CET | 1.1.1.1 | 192.168.2.4 | 0x64d9 | No error (0) | 52.28.247.255 | A (IP address) | IN (0x0001) | false | ||
Dec 3, 2023 20:23:47.777641058 CET | 1.1.1.1 | 192.168.2.4 | 0x9b01 | No error (0) | 3.69.115.178 | A (IP address) | IN (0x0001) | false | ||
Dec 3, 2023 20:24:22.401644945 CET | 1.1.1.1 | 192.168.2.4 | 0xab51 | No error (0) | 3.66.38.117 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 20:21:07 |
Start date: | 03/12/2023 |
Path: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe30000 |
File size: | 105'472 bytes |
MD5 hash: | 85AA59199316A48AE26E32A9A674D2AE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | .Net C# or VB.NET |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 20:21:13 |
Start date: | 03/12/2023 |
Path: | C:\Windows\SysWOW64\netsh.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1560000 |
File size: | 82'432 bytes |
MD5 hash: | 4E89A1A088BE715D6C946E55AB07C7DF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 2 |
Start time: | 20:21:14 |
Start date: | 03/12/2023 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 20:21:23 |
Start date: | 03/12/2023 |
Path: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb20000 |
File size: | 105'472 bytes |
MD5 hash: | 85AA59199316A48AE26E32A9A674D2AE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Target ID: | 8 |
Start time: | 20:21:32 |
Start date: | 03/12/2023 |
Path: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x20000 |
File size: | 105'472 bytes |
MD5 hash: | 85AA59199316A48AE26E32A9A674D2AE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Target ID: | 9 |
Start time: | 20:21:43 |
Start date: | 03/12/2023 |
Path: | C:\Users\user\Desktop\QsKtlzYaKF.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1d0000 |
File size: | 105'472 bytes |
MD5 hash: | 85AA59199316A48AE26E32A9A674D2AE |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | .Net C# or VB.NET |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 20.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 8% |
Total number of Nodes: | 175 |
Total number of Limit Nodes: | 8 |
Graph
Function 0173BA9F Relevance: 1.6, APIs: 1, Instructions: 75COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05760163 Relevance: 1.6, APIs: 1, Instructions: 64nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BAD6 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BE04 Relevance: 1.6, APIs: 1, Instructions: 50nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BE26 Relevance: 1.5, APIs: 1, Instructions: 38nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576019E Relevance: 1.5, APIs: 1, Instructions: 38nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 056010A8 Relevance: 1.6, APIs: 1, Instructions: 115COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05601099 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761E0A Relevance: 1.6, APIs: 1, Instructions: 108COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761B7C Relevance: 1.6, APIs: 1, Instructions: 93COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761A74 Relevance: 1.6, APIs: 1, Instructions: 91timeCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761468 Relevance: 1.6, APIs: 1, Instructions: 89COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173ADAD Relevance: 1.6, APIs: 1, Instructions: 86fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BD0C Relevance: 1.6, APIs: 1, Instructions: 86COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05763160 Relevance: 1.6, APIs: 1, Instructions: 85COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761B9E Relevance: 1.6, APIs: 1, Instructions: 84COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173AEA8 Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05763091 Relevance: 1.6, APIs: 1, Instructions: 80COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761042 Relevance: 1.6, APIs: 1, Instructions: 77networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576161E Relevance: 1.6, APIs: 1, Instructions: 77fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173ADD2 Relevance: 1.6, APIs: 1, Instructions: 76fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B238 Relevance: 1.6, APIs: 1, Instructions: 76fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576148E Relevance: 1.6, APIs: 1, Instructions: 76COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576325F Relevance: 1.6, APIs: 1, Instructions: 73COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 057618B5 Relevance: 1.6, APIs: 1, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B927 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05762FCB Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BB6C Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173AB4D Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A710 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761062 Relevance: 1.6, APIs: 1, Instructions: 67networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761D4E Relevance: 1.6, APIs: 1, Instructions: 67networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576163E Relevance: 1.6, APIs: 1, Instructions: 67fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576210A Relevance: 1.6, APIs: 1, Instructions: 66libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173ACE8 Relevance: 1.6, APIs: 1, Instructions: 64fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761AB2 Relevance: 1.6, APIs: 1, Instructions: 64timeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576319E Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05763282 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BD4A Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B25E Relevance: 1.6, APIs: 1, Instructions: 60fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 057600B8 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05762FEE Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A9B5 Relevance: 1.6, APIs: 1, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 057618E2 Relevance: 1.6, APIs: 1, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A2D2 Relevance: 1.6, APIs: 1, Instructions: 56COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576042C Relevance: 1.6, APIs: 1, Instructions: 56COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576212A Relevance: 1.6, APIs: 1, Instructions: 56libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 057630CA Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A078 Relevance: 1.6, APIs: 1, Instructions: 54networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B956 Relevance: 1.6, APIs: 1, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173AD0A Relevance: 1.6, APIs: 1, Instructions: 53fileCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173AEEA Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B0DC Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A918 Relevance: 1.6, APIs: 1, Instructions: 51COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761D7E Relevance: 1.5, APIs: 1, Instructions: 49networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 057600DA Relevance: 1.5, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173AB8E Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05761E9E Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0576044E Relevance: 1.5, APIs: 1, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173BBA6 Relevance: 1.5, APIs: 1, Instructions: 43COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A09A Relevance: 1.5, APIs: 1, Instructions: 42networkCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A93A Relevance: 1.5, APIs: 1, Instructions: 40COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173B0FE Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A9E2 Relevance: 1.5, APIs: 1, Instructions: 39COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0173A2FE Relevance: 1.5, APIs: 1, Instructions: 35COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017E08FE Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05E426C0 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017E0934 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0174B858 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017E05DF Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017E09F0 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017E0606 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0174B8A7 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05E41FD7 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 05E4272B Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017323F4 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 017323BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 18.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 19 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0112A710 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0112A74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 052F0310 Relevance: .2, Instructions: 188COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 052F03BD Relevance: .1, Instructions: 135COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 052F0080 Relevance: .1, Instructions: 129COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 052F0006 Relevance: .0, Instructions: 47COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 016405E0 Relevance: .0, Instructions: 44COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 01640606 Relevance: .0, Instructions: 27COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 011223F4 Relevance: .0, Instructions: 15COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 011223BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 11.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 19 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0094A710 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 0094A74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00B60310 Relevance: .2, Instructions: 193COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00B603BD Relevance: .1, Instructions: 135COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00B60080 Relevance: .1, Instructions: 130COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00B60006 Relevance: .0, Instructions: 46COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00A005E0 Relevance: .0, Instructions: 44COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00A00606 Relevance: .0, Instructions: 27COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 009423F4 Relevance: .0, Instructions: 15COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 009423BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Execution Graph
Execution Coverage: | 11.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 19 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007BA710 Relevance: 1.6, APIs: 1, Instructions: 70COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007BA74E Relevance: 1.5, APIs: 1, Instructions: 43COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00C9026D Relevance: .5, Instructions: 522COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 049A0310 Relevance: .2, Instructions: 191COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 049A03BD Relevance: .1, Instructions: 135COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 049A0080 Relevance: .1, Instructions: 129COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00C905E0 Relevance: .0, Instructions: 44COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 049A0006 Relevance: .0, Instructions: 41COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 00C90606 Relevance: .0, Instructions: 27COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007B23F4 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |
Function 007B23BC Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Uniqueness |
Uniqueness Score: -1.00% |