Windows
Analysis Report
z64BLPL.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- z64BLPL.exe (PID: 7268 cmdline:
"C:\Users\ user\Deskt op\z64BLPL .exe" MD5: 9C7CF85D2FA1D9C0B6C591B94CBF2830)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Email ID": "manoj@electradubai.com", "Password": "LordHaveMercy!!123", "Host": "mail.electradubai.com", "Port": "25", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 2 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 2 entries |
System Summary |
---|
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-26T17:10:01.211022+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-26T17:09:59.130992+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:00.568500+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:22.605931+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:31.334225+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49740 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:35.905707+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:36.584155+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:38.849813+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49744 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:42.177920+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49746 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:43.662331+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49748 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:45.099812+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49750 | 193.122.6.168 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | URL Reputation: | ||
Source: | URL Reputation: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00D3F138 | |
Source: | Code function: | 0_2_00D3F324 | |
Source: | Code function: | 0_2_00D3F7EC | |
Source: | Code function: | 0_2_06692F48 | |
Source: | Code function: | 0_2_06690B30 | |
Source: | Code function: | 0_2_06690B30 | |
Source: | Code function: | 0_2_06692970 | |
Source: | Code function: | 0_2_0669CE20 | |
Source: | Code function: | 0_2_0669D6D0 | |
Source: | Code function: | 0_2_06692F37 | |
Source: | Code function: | 0_2_0669DF80 | |
Source: | Code function: | 0_2_0669EC88 | |
Source: | Code function: | 0_2_0669F538 | |
Source: | Code function: | 0_2_0669D278 | |
Source: | Code function: | 0_2_0669328E | |
Source: | Code function: | 0_2_0669DB28 | |
Source: | Code function: | 0_2_0669E3D8 | |
Source: | Code function: | 0_2_06690040 | |
Source: | Code function: | 0_2_0669E830 | |
Source: | Code function: | 0_2_0669F0E0 | |
Source: | Code function: | 0_2_0669F990 |
Networking |
---|
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00BFC571 | |
Source: | Code function: | 0_2_00BF268C | |
Source: | Code function: | 0_2_00BF5708 | |
Source: | Code function: | 0_2_00D3A088 | |
Source: | Code function: | 0_2_00D3C146 | |
Source: | Code function: | 0_2_00D37118 | |
Source: | Code function: | 0_2_00D3D2CB | |
Source: | Code function: | 0_2_00D35362 | |
Source: | Code function: | 0_2_00D3C468 | |
Source: | Code function: | 0_2_00D3D599 | |
Source: | Code function: | 0_2_00D3C738 | |
Source: | Code function: | 0_2_00D369A0 | |
Source: | Code function: | 0_2_00D3EAA8 | |
Source: | Code function: | 0_2_00D3FC37 | |
Source: | Code function: | 0_2_00D3CD28 | |
Source: | Code function: | 0_2_00D3CFF7 | |
Source: | Code function: | 0_2_00D3F7EC | |
Source: | Code function: | 0_2_00D339ED | |
Source: | Code function: | 0_2_00D329EC | |
Source: | Code function: | 0_2_00D3EA9B | |
Source: | Code function: | 0_2_00D33AA1 | |
Source: | Code function: | 0_2_00D33E09 | |
Source: | Code function: | 0_2_066996C8 | |
Source: | Code function: | 0_2_06699DF0 | |
Source: | Code function: | 0_2_06692288 | |
Source: | Code function: | 0_2_06690B30 | |
Source: | Code function: | 0_2_06691BA8 | |
Source: | Code function: | 0_2_06692970 | |
Source: | Code function: | 0_2_066951A8 | |
Source: | Code function: | 0_2_0669CE20 | |
Source: | Code function: | 0_2_0669CE0F | |
Source: | Code function: | 0_2_0669D6C0 | |
Source: | Code function: | 0_2_0669D6D0 | |
Source: | Code function: | 0_2_0669DF7F | |
Source: | Code function: | 0_2_0669DF80 | |
Source: | Code function: | 0_2_0669EC78 | |
Source: | Code function: | 0_2_066994A8 | |
Source: | Code function: | 0_2_0669EC88 | |
Source: | Code function: | 0_2_0669F528 | |
Source: | Code function: | 0_2_06698D20 | |
Source: | Code function: | 0_2_0669F538 | |
Source: | Code function: | 0_2_06698D11 | |
Source: | Code function: | 0_2_06699D89 | |
Source: | Code function: | 0_2_0669D278 | |
Source: | Code function: | 0_2_06692278 | |
Source: | Code function: | 0_2_0669DB28 | |
Source: | Code function: | 0_2_06690B20 | |
Source: | Code function: | 0_2_0669DB19 | |
Source: | Code function: | 0_2_0669E3CA | |
Source: | Code function: | 0_2_0669E3D8 | |
Source: | Code function: | 0_2_06691B97 | |
Source: | Code function: | 0_2_06690040 | |
Source: | Code function: | 0_2_0669E82F | |
Source: | Code function: | 0_2_0669E830 | |
Source: | Code function: | 0_2_06690006 | |
Source: | Code function: | 0_2_0669F0E0 | |
Source: | Code function: | 0_2_0669F0D1 | |
Source: | Code function: | 0_2_0669F982 | |
Source: | Code function: | 0_2_06695198 | |
Source: | Code function: | 0_2_0669F990 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_066996C8 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 1 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Email Collection | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 31 Virtualization/Sandbox Evasion | LSASS Memory | 1 Security Software Discovery | Remote Desktop Protocol | 11 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Deobfuscate/Decode Files or Information | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 1 Data from Local System | 3 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Obfuscated Files or Information | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 1 System Network Configuration Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 13 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
74% | ReversingLabs | ByteCode-MSIL.Spyware.Snakekeylogger | ||
100% | Avira | HEUR/AGEN.1307591 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
100% | URL Reputation | malware | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
100% | URL Reputation | malware | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
mail.electradubai.com | 192.250.231.25 | true | true | unknown | |
reallyfreegeoip.org | 188.114.97.3 | true | true | unknown | |
api.telegram.org | 149.154.167.220 | true | true | unknown | |
checkip.dyndns.com | 193.122.6.168 | true | false | unknown | |
checkip.dyndns.org | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | true | |
188.114.97.3 | reallyfreegeoip.org | European Union | 13335 | CLOUDFLARENETUS | true | |
193.122.6.168 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false | |
192.250.231.25 | mail.electradubai.com | United States | 36454 | CNSV-LLCUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1519553 |
Start date and time: | 2024-09-26 17:09:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | z64BLPL.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.winEXE@1/0@4/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: z64BLPL.exe
Time | Type | Description |
---|---|---|
11:09:59 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT, Snake Keylogger, VIP Keylogger | Browse | |||
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Lokibot | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
193.122.6.168 | Get hash | malicious | VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DarkTortilla, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
reallyfreegeoip.org | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
checkip.dyndns.com | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
api.telegram.org | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ORACLE-BMC-31898US | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
TELEGRAMRU | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, Snake Keylogger, VIP Keylogger | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | EvilProxy, HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CNSV-LLCUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | GuLoader, Remcos | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PXRECVOWEIWOEI Stealer, PureLog Stealer | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
File type: | |
Entropy (8bit): | 5.631943584952463 |
TrID: |
|
File name: | z64BLPL.exe |
File size: | 276'992 bytes |
MD5: | 9c7cf85d2fa1d9c0b6c591b94cbf2830 |
SHA1: | 55822a8ed3ceda0fc325d998af2e379fb05a948e |
SHA256: | fe777d4ff348afb74ba7556da56b29a4ee0a66f7b044674fd1f18641573337f2 |
SHA512: | 813817015ddeec9e3bab1e1a945cecb942f75250fc2ea0de89de28c604e69d204d2a0217d4fa6be0d09bb662fddd2a17849a3989eb5a11bdd4b087ffddffb15f |
SSDEEP: | 3072:8WAT5ctg+Orw0aqqb5mlXYOE6jc7dz0pHuhdzm3bfS2z/LQunsoAUYTVg4iIbbY:v6sm3bg7b |
TLSH: | A84484092FD8A801D6FF8877C2B65125C6BAF42306698E3E16D1F81A3E3D541DE46F63 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............P..$...........C... ...`....@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x44432e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x669085D9 [Fri Jul 12 01:24:41 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x442d4 | 0x57 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x46000 | 0x1017 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x48000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x42334 | 0x42400 | 2c0ce32df969b8f70c1ba77c652c23c0 | False | 0.2141583136792453 | data | 5.633651046865783 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x46000 | 0x1017 | 0x1200 | 78b97a769c57cf460625c961b04b1a16 | False | 0.3543836805555556 | data | 4.76801789588623 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x48000 | 0xc | 0x200 | 3357292ff3dc4e25505da1bb6c6902f0 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x460a0 | 0x31c | data | 0.4271356783919598 | ||
RT_MANIFEST | 0x463bc | 0xc5b | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.3926651912741069 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-09-26T17:09:59.130992+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:00.568500+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:01.211022+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-09-26T17:10:22.605931+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:31.334225+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49740 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:35.905707+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:36.584155+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:38.849813+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49744 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:42.177920+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49746 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:43.662331+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49748 | 193.122.6.168 | 80 | TCP |
2024-09-26T17:10:45.099812+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49750 | 193.122.6.168 | 80 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 26, 2024 17:09:58.206500053 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:09:58.211630106 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:09:58.211724043 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:09:58.211992025 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:09:58.217827082 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:09:58.880146980 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:09:58.885175943 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:09:58.895159960 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:09:59.077944040 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:09:59.130991936 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:09:59.139976025 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:09:59.139998913 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:09:59.140070915 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:09:59.149842024 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:09:59.149857044 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:09:59.654016018 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:09:59.654151917 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:09:59.660387993 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:09:59.660410881 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:09:59.660840034 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:09:59.709083080 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.183356047 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.223400116 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:00.309858084 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:00.309971094 CEST | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:00.310082912 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.317410946 CEST | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.320966005 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:00.326773882 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:00.527089119 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:00.531579018 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.531611919 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:00.531682968 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.532172918 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:00.532185078 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:00.568500042 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.030261040 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:01.032318115 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:01.032335043 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:01.211050987 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:01.211169004 CEST | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:01.211317062 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:01.211633921 CEST | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:01.214828014 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.215993881 CEST | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.220967054 CEST | 80 | 49730 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:01.220978975 CEST | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:01.221060038 CEST | 49730 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.221093893 CEST | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.221191883 CEST | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:01.226352930 CEST | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:22.602520943 CEST | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:22.605931044 CEST | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:22.612098932 CEST | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:22.614058018 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:22.616991043 CEST | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:22.619029045 CEST | 80 | 49740 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:22.622540951 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:22.622690916 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:22.627482891 CEST | 80 | 49740 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:31.285698891 CEST | 80 | 49740 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:31.287059069 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.287173033 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.287324905 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.287621021 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.287658930 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.334224939 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.755745888 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.765150070 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.765259027 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.907733917 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.907836914 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:31.907913923 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.908370972 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:31.911853075 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.912946939 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.916982889 CEST | 80 | 49740 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:31.917054892 CEST | 49740 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.917776108 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:31.917862892 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.917932987 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:31.922975063 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:35.905607939 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:35.905626059 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:35.905706882 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:35.914891958 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:35.919748068 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:36.537620068 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:36.538822889 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:36.538867950 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:36.538954020 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:36.539254904 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:36.539269924 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:36.584155083 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.010214090 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:37.017998934 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:37.018044949 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:37.160572052 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:37.160738945 CEST | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:37.160809040 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:37.161380053 CEST | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:37.164859056 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.166100025 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.170149088 CEST | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:37.170243025 CEST | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.170954943 CEST | 80 | 49744 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:37.171041012 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.171185017 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:37.176091909 CEST | 80 | 49744 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:38.807979107 CEST | 80 | 49744 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:38.809443951 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:38.809549093 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:38.809798956 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:38.809967995 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:38.810002089 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:38.849812984 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.333060980 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:39.335103035 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:39.335130930 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:39.473113060 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:39.473263979 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:39.473336935 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:39.473687887 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:39.476654053 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.478049040 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.482548952 CEST | 80 | 49744 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:39.482614994 CEST | 49744 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.483913898 CEST | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:39.483997107 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.484121084 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:39.490559101 CEST | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:42.134253025 CEST | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:42.135741949 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.135843992 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.136008024 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.136239052 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.136271000 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.177920103 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.643096924 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.644798994 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.644854069 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.866292000 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.866406918 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:42.866473913 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.870654106 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:42.899295092 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.900207043 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.940862894 CEST | 80 | 49748 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:42.940983057 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.941111088 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.943008900 CEST | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:42.943085909 CEST | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:42.956279039 CEST | 80 | 49748 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:43.617235899 CEST | 80 | 49748 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:43.618619919 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:43.618662119 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:43.618773937 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:43.619131088 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:43.619144917 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:43.662331104 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.142925024 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:44.144808054 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:44.144829035 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:44.323335886 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:44.323504925 CEST | 443 | 49749 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:44.323589087 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:44.324064970 CEST | 49749 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:44.327312946 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.328552008 CEST | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.332680941 CEST | 80 | 49748 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:44.332761049 CEST | 49748 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.334686041 CEST | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:44.334762096 CEST | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.334860086 CEST | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:44.340409040 CEST | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:45.045376062 CEST | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Sep 26, 2024 17:10:45.047786951 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.047904015 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.047998905 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.048367023 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.048402071 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.099812031 CEST | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:45.560137033 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.561798096 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.561867952 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.708945990 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.709058046 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Sep 26, 2024 17:10:45.709111929 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.709484100 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Sep 26, 2024 17:10:45.730833054 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:45.730907917 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:45.730979919 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:45.731292009 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:45.731328964 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.371262074 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.371479988 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:46.374813080 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:46.374833107 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.375344992 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.376605034 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:46.423396111 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.663913965 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.663986921 CEST | 443 | 49752 | 149.154.167.220 | 192.168.2.4 |
Sep 26, 2024 17:10:46.664156914 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:46.664468050 CEST | 49752 | 443 | 192.168.2.4 | 149.154.167.220 |
Sep 26, 2024 17:10:51.925179005 CEST | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Sep 26, 2024 17:10:52.379081011 CEST | 49753 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:10:53.381150007 CEST | 49753 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:10:55.396852970 CEST | 49753 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:10:59.412341118 CEST | 49753 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:07.412394047 CEST | 49753 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:14.947559118 CEST | 49755 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:15.959227085 CEST | 49755 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:17.959270000 CEST | 49755 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:21.959280014 CEST | 49755 | 25 | 192.168.2.4 | 192.250.231.25 |
Sep 26, 2024 17:11:29.959240913 CEST | 49755 | 25 | 192.168.2.4 | 192.250.231.25 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Sep 26, 2024 17:09:58.093405008 CEST | 58686 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 26, 2024 17:09:58.199585915 CEST | 53 | 58686 | 1.1.1.1 | 192.168.2.4 |
Sep 26, 2024 17:09:59.125065088 CEST | 55657 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 26, 2024 17:09:59.139177084 CEST | 53 | 55657 | 1.1.1.1 | 192.168.2.4 |
Sep 26, 2024 17:10:45.722960949 CEST | 49318 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 26, 2024 17:10:45.730357885 CEST | 53 | 49318 | 1.1.1.1 | 192.168.2.4 |
Sep 26, 2024 17:10:52.313168049 CEST | 54363 | 53 | 192.168.2.4 | 1.1.1.1 |
Sep 26, 2024 17:10:52.378348112 CEST | 53 | 54363 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Sep 26, 2024 17:09:58.093405008 CEST | 192.168.2.4 | 1.1.1.1 | 0x28d5 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 26, 2024 17:09:59.125065088 CEST | 192.168.2.4 | 1.1.1.1 | 0x4664 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 26, 2024 17:10:45.722960949 CEST | 192.168.2.4 | 1.1.1.1 | 0x7b48 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Sep 26, 2024 17:10:52.313168049 CEST | 192.168.2.4 | 1.1.1.1 | 0x61dd | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:58.199585915 CEST | 1.1.1.1 | 192.168.2.4 | 0x28d5 | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:59.139177084 CEST | 1.1.1.1 | 192.168.2.4 | 0x4664 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:09:59.139177084 CEST | 1.1.1.1 | 192.168.2.4 | 0x4664 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:10:45.730357885 CEST | 1.1.1.1 | 192.168.2.4 | 0x7b48 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false | ||
Sep 26, 2024 17:10:52.378348112 CEST | 1.1.1.1 | 192.168.2.4 | 0x61dd | No error (0) | 192.250.231.25 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:09:58.211992025 CEST | 151 | OUT | |
Sep 26, 2024 17:09:58.880146980 CEST | 320 | IN | |
Sep 26, 2024 17:09:58.885175943 CEST | 127 | OUT | |
Sep 26, 2024 17:09:59.077944040 CEST | 320 | IN | |
Sep 26, 2024 17:10:00.320966005 CEST | 127 | OUT | |
Sep 26, 2024 17:10:00.527089119 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:01.221191883 CEST | 127 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:22.622690916 CEST | 127 | OUT | |
Sep 26, 2024 17:10:31.285698891 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:31.917932987 CEST | 127 | OUT | |
Sep 26, 2024 17:10:35.905607939 CEST | 745 | IN | |
Sep 26, 2024 17:10:35.905626059 CEST | 745 | IN | |
Sep 26, 2024 17:10:35.914891958 CEST | 127 | OUT | |
Sep 26, 2024 17:10:36.537620068 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49744 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:37.171185017 CEST | 127 | OUT | |
Sep 26, 2024 17:10:38.807979107 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49746 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:39.484121084 CEST | 127 | OUT | |
Sep 26, 2024 17:10:42.134253025 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49748 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:42.941111088 CEST | 127 | OUT | |
Sep 26, 2024 17:10:43.617235899 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49750 | 193.122.6.168 | 80 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Sep 26, 2024 17:10:44.334860086 CEST | 127 | OUT | |
Sep 26, 2024 17:10:45.045376062 CEST | 320 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:00 UTC | 84 | OUT | |
2024-09-26 15:10:00 UTC | 680 | IN | |
2024-09-26 15:10:00 UTC | 340 | IN | |
2024-09-26 15:10:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:01 UTC | 60 | OUT | |
2024-09-26 15:10:01 UTC | 686 | IN | |
2024-09-26 15:10:01 UTC | 340 | IN | |
2024-09-26 15:10:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:31 UTC | 84 | OUT | |
2024-09-26 15:10:31 UTC | 682 | IN | |
2024-09-26 15:10:31 UTC | 340 | IN | |
2024-09-26 15:10:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:37 UTC | 84 | OUT | |
2024-09-26 15:10:37 UTC | 680 | IN | |
2024-09-26 15:10:37 UTC | 340 | IN | |
2024-09-26 15:10:37 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49745 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:39 UTC | 84 | OUT | |
2024-09-26 15:10:39 UTC | 676 | IN | |
2024-09-26 15:10:39 UTC | 340 | IN | |
2024-09-26 15:10:39 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:42 UTC | 84 | OUT | |
2024-09-26 15:10:42 UTC | 678 | IN | |
2024-09-26 15:10:42 UTC | 340 | IN | |
2024-09-26 15:10:42 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49749 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:44 UTC | 84 | OUT | |
2024-09-26 15:10:44 UTC | 676 | IN | |
2024-09-26 15:10:44 UTC | 340 | IN | |
2024-09-26 15:10:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49751 | 188.114.97.3 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:45 UTC | 84 | OUT | |
2024-09-26 15:10:45 UTC | 676 | IN | |
2024-09-26 15:10:45 UTC | 340 | IN | |
2024-09-26 15:10:45 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49752 | 149.154.167.220 | 443 | 7268 | C:\Users\user\Desktop\z64BLPL.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-09-26 15:10:46 UTC | 349 | OUT | |
2024-09-26 15:10:46 UTC | 344 | IN | |
2024-09-26 15:10:46 UTC | 55 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 11:09:57 |
Start date: | 26/09/2024 |
Path: | C:\Users\user\Desktop\z64BLPL.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x690000 |
File size: | 276'992 bytes |
MD5 hash: | 9C7CF85D2FA1D9C0B6C591B94CBF2830 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 14.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 16.1% |
Total number of Nodes: | 112 |
Total number of Limit Nodes: | 9 |
Graph
Function 00D3C146 Relevance: 6.5, Strings: 5, Instructions: 224COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D35362 Relevance: 6.4, Strings: 5, Instructions: 195COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3CD28 Relevance: 6.4, Strings: 5, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3CFF7 Relevance: 6.4, Strings: 5, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3C468 Relevance: 6.4, Strings: 5, Instructions: 185COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3D599 Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3D2CB Relevance: 6.4, Strings: 5, Instructions: 183COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3C738 Relevance: 6.4, Strings: 5, Instructions: 183COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D329EC Relevance: 5.5, Strings: 4, Instructions: 490COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D37118 Relevance: 5.3, Strings: 4, Instructions: 339COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 066951A8 Relevance: 4.3, Strings: 1, Instructions: 3069COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06699DF0 Relevance: 3.5, Strings: 1, Instructions: 2230COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3A088 Relevance: 3.4, Strings: 2, Instructions: 890COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D369A0 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 066996C8 Relevance: 1.9, APIs: 1, Instructions: 357COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06699D89 Relevance: 1.5, Strings: 1, Instructions: 266COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690B30 Relevance: .7, Instructions: 709COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692970 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692288 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692F48 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692F37 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06691BA8 Relevance: .2, Instructions: 219COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3FC37 Relevance: .2, Instructions: 204COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669328E Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690B20 Relevance: .2, Instructions: 168COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06691B97 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3EAA8 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3EA9B Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692278 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D376F1 Relevance: 10.5, Strings: 8, Instructions: 470COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D35F38 Relevance: 2.8, Strings: 2, Instructions: 264COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36498 Relevance: 2.7, Strings: 2, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D39C30 Relevance: 2.6, Strings: 2, Instructions: 148COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3AEBB Relevance: 2.6, Strings: 2, Instructions: 113COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D33CC0 Relevance: 2.6, Strings: 2, Instructions: 112COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D38EF8 Relevance: 2.6, Strings: 2, Instructions: 99COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D30C8F Relevance: 1.8, Strings: 1, Instructions: 546COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D30CA0 Relevance: 1.8, Strings: 1, Instructions: 539COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BF45AC Relevance: 1.6, APIs: 1, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BF46FC Relevance: 1.6, APIs: 1, Instructions: 97COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06699AAC Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BF5220 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BFB068 Relevance: 1.5, APIs: 1, Instructions: 46comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3E129 Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3E138 Relevance: .6, Instructions: 647COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D39A10 Relevance: .2, Instructions: 227COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D380D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F597 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3D869 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D341A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3A303 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36FC8 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D35658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D32790 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D38380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD005 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D362F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D328F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00CDD044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D34285 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D35649 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D39761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3AEF0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F4B8 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36300 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D327F0 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F4C8 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D35E98 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3ABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3EA09 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D328A3 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D328B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36739 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3AFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BFC571 Relevance: 5.3, Strings: 4, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D33E09 Relevance: 2.8, Strings: 2, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690040 Relevance: 1.8, Strings: 1, Instructions: 596COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06698D20 Relevance: 1.6, Strings: 1, Instructions: 367COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690006 Relevance: 1.4, Strings: 1, Instructions: 162COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BF5708 Relevance: .5, Instructions: 522COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D278 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669CE20 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D6D0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669DB28 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E3D8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669DF80 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E830 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F0E0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669EC88 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F538 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F990 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F7EC Relevance: .3, Instructions: 265COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BF268C Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 066994A8 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06695198 Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D33AA1 Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F138 Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D3F324 Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06698D11 Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F528 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D6C0 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669EC78 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F0D1 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669CE0F Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669DB19 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E3CA Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F982 Relevance: .1, Instructions: 99COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669DF7F Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E82F Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D339ED Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D36920 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|