Windows
Analysis Report
Quote_220072.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Quote_220072.exe (PID: 7384 cmdline:
"C:\Users\ user\Deskt op\Quote_2 20072.exe" MD5: AC900546C8BF5B3BE3184502D0D2D7BA) - Quote_220072.exe (PID: 7888 cmdline:
"C:\Users\ user\Deskt op\Quote_2 20072.exe" MD5: AC900546C8BF5B3BE3184502D0D2D7BA)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.mbarieservicesltd.com", "Username": "saless@mbarieservicesltd.com", "Password": " *o9H+18Q4%;M "}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:15:13.891888+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.9 | 49735 | TCP |
2024-11-01T12:15:52.715680+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.9 | 49741 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:14:50.254129+0100 | 2030171 | 1 | A Network Trojan was detected | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:15:46.463898+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:15:46.463898+0100 | 2855245 | 1 | A Network Trojan was detected | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:15:39.027883+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.9 | 49738 | 172.217.18.14 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:14:50.254129+0100 | 2839723 | 1 | Malware Command and Control Activity Detected | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:14:50.254129+0100 | 2840032 | 1 | A Network Trojan was detected | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004066F7 | |
Source: | Code function: | 0_2_004065AD |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004036DA |
Source: | Code function: | 0_2_6FF82351 | |
Source: | Code function: | 5_2_348813B8 | |
Source: | Code function: | 5_2_34884140 | |
Source: | Code function: | 5_2_34884D58 | |
Source: | Code function: | 5_2_34884488 | |
Source: | Code function: | 5_2_377EDE38 | |
Source: | Code function: | 5_2_377E45A8 | |
Source: | Code function: | 5_2_377E8BE8 | |
Source: | Code function: | 5_2_377EF210 | |
Source: | Code function: | 5_2_377E4FA0 | |
Source: | Code function: | 5_2_377E8330 | |
Source: | Code function: | 5_2_377E7BA8 | |
Source: | Code function: | 5_2_37916400 | |
Source: | Code function: | 5_2_37919C30 | |
Source: | Code function: | 5_2_37913570 | |
Source: | Code function: | 5_2_3791B3B2 | |
Source: | Code function: | 5_2_37933608 | |
Source: | Code function: | 5_2_379319A0 |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004036DA |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_6FF82351 |
Source: | Code function: | 5_2_377E1A2B | |
Source: | Code function: | 5_2_377E19F1 |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Evaded block: | graph_0-3126 |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Code function: | 0_2_004066F7 | |
Source: | Code function: | 0_2_004065AD |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-3014 |
Source: | Code function: | 0_2_6FF82351 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_004036DA |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Access Token Manipulation | 1 Masquerading | 2 OS Credential Dumping | 311 Security Software Discovery | Remote Services | 1 Email Collection | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 2 Native API | Boot or Logon Initialization Scripts | 11 Process Injection | 1 Disable or Modify Tools | 1 Credentials in Registry | 141 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Archive Collected Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 141 Virtualization/Sandbox Evasion | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | 2 Data from Local System | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Access Token Manipulation | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Process Injection | LSA Secrets | 225 System Information Discovery | SSH | Keylogging | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
55% | ReversingLabs | Win32.Trojan.GuLoader |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
drive.google.com | 172.217.18.14 | true | false | unknown | |
drive.usercontent.google.com | 142.250.185.193 | true | false | unknown | |
mail.mbarieservicesltd.com | 199.79.62.115 | true | true | unknown | |
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | 84.201.210.22 | true | false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.193 | drive.usercontent.google.com | United States | 15169 | GOOGLEUS | false | |
199.79.62.115 | mail.mbarieservicesltd.com | United States | 394695 | PUBLIC-DOMAIN-REGISTRYUS | true | |
172.217.18.14 | drive.google.com | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1546663 |
Start date and time: | 2024-11-01 12:14:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 27s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Quote_220072.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@3/12@3/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Quote_220072.exe
Time | Type | Description |
---|---|---|
07:15:43 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
199.79.62.115 | Get hash | malicious | AgentTesla, PureLog Stealer | Browse | ||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse | |||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | AgentTesla | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
mail.mbarieservicesltd.com | Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AsyncRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | FormBook, GuLoader | Browse |
| |
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsi6AEA.tmp\System.dll | Get hash | malicious | FormBook, GuLoader | Browse | ||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | AgentTesla, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 12288 |
Entropy (8bit): | 5.97694153396788 |
Encrypted: | false |
SSDEEP: | 192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw |
MD5: | D6F54D2CEFDF58836805796F55BFC846 |
SHA1: | B980ADDC1A755B968DD5799179D3B4F1C2DE9D2D |
SHA-256: | F917AEF484D1FBB4D723B2E2D3045CB6F5F664E61FBB3D5C577BD1C215DE55D9 |
SHA-512: | CE67DA936A93D46EF7E81ABC8276787C82FD844C03630BA18AFC3528C7E420C3228BFE82AEDA083BB719F2D1314AFAE913362ABD1E220CB364606519690D45DB |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 35 |
Entropy (8bit): | 4.264578373902383 |
Encrypted: | false |
SSDEEP: | 3:apWPWPjNLCNHiy:UPRCNHiy |
MD5: | 58AC0B5E1D49D0EE1AED2FE13FAE6C7A |
SHA1: | 02C8384573D47CA39F2E2ACA32B275861EC59A93 |
SHA-256: | 624F49944CB84ED51FECABCD549AE3B47152F9A20C4A95E93C8B007AEFE9FEAB |
SHA-512: | 8F5F062D6EBB8312DA4AD4F5AF077B1EAA2E14244823F15E6A87A9E48C7172CC1EA5AB691D3B4F9D8F8E0605F9CB3AA06590B4389820DA531633D9915B988FFC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 482519 |
Entropy (8bit): | 1.2446382063037653 |
Encrypted: | false |
SSDEEP: | 1536:+yiLw81PnsncGiIsTVODPOqNbsVEVWZkZA4:G/Pne9iIyVODPsVpZkZA4 |
MD5: | 1D099F6122F4B7C8A78925726B59E5C3 |
SHA1: | EEA154E31FF04CD1A2CED0193F7633ED219CFA47 |
SHA-256: | 1B6DC1EAD079DB05B998725B154E803E6E1504E7E5B49C5611D55E018CD45E6D |
SHA-512: | F31F0A285C5A6EB2236CCD49A8BF939E46624F270E0270FC4C5640B37684BC1C7780C5350F778DA8E9D0B8CD25320C1909A9CD937F15BB3A7CDDBCEEE94C47FB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 382628 |
Entropy (8bit): | 7.615524931322322 |
Encrypted: | false |
SSDEEP: | 6144:Hp5UB/kV1MbtTP3AgT4Q5yAlLwOZ0HSITzdTm3XN96seHBNl5E11S5K:J5UMMbN3t4Q5y2Z0JTzdK3d96T3l5k13 |
MD5: | C662F57E58B59BF6D8398CC36965101B |
SHA1: | B2D9813D1CBDD40BD87E88D96D638E8133B39528 |
SHA-256: | 7FF3268F5BAC4D92B87EE9F88736476E1BEE040E1C4F912F65829675A5EF2220 |
SHA-512: | 36989CEE939554BF4802342699EFFE1B14F80568119DF66C480659D822FAE065C189099D0AFC42B4581FC12839CC8F7D2E5B9E05B3DC993657B19620AA190DCC |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 288955 |
Entropy (8bit): | 1.2577770955280814 |
Encrypted: | false |
SSDEEP: | 768:l1SkOmjqFRV/HZzy6+19kZBH4YVHCdJS7G5iOUEEaXXLlgHHl7MRY9hN+418WPK5:KOqvBJzC5vBhp8KT9AGCbQTZkkR |
MD5: | 0B62328C4966F6B879B3C13B7FBD9C0D |
SHA1: | 6DD81F12E739E81E06778067513ED1178A06AFC9 |
SHA-256: | 645C325F62AF720972466322B09A7E396E46D8E640B138D582374B68D763A3A7 |
SHA-512: | 2F738A2950352F124F7B969D38B52BD2E4453FF42BC8DEB7566620E6CDEA30368A6DC16230BA49050F8C0327175CAB71DC4A1709541F08A3FFDCF55FAF5B75B8 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 340974 |
Entropy (8bit): | 1.254605943274635 |
Encrypted: | false |
SSDEEP: | 768:AgVdAd1etxyZmQhZgJwrQTTwKuiTGrJqCoIEsPkZnFFSKsOI4v/3n35lB3LiADa4:5TxLsV5IjQ3xx12 |
MD5: | 49BE0E06F2E4F0CCFFB46426EE262642 |
SHA1: | FF9C56C31A824E4CA087705C23D01D288FE34239 |
SHA-256: | A55DAC07FB586D4B64F0DDF812087A2EEEC6F5286D9BC73AD648ED3220ABDD3A |
SHA-512: | 27E9D035708943DD257186457C15488C9405747FC77F7C76760C96EE011C239F9FA53B5DA17958038FB2BA1C4E27E643E7924A37E6164E250B9F45A109D92E53 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 392462 |
Entropy (8bit): | 1.241128723454179 |
Encrypted: | false |
SSDEEP: | 768:jby0EUrStmwpKcx/orVcYZ+M3ok1I7vZFCDrlv2UV5t3votN6cGia46OGj3OkYSk:FaZaukRTadSdbrJ5N275Ea3nRYS3r |
MD5: | F130EC3095DBECEDC791D8C58A59040C |
SHA1: | DAD2300B487F31F199520E1B41AB02B7D677B352 |
SHA-256: | A56351ED69A301F5D9D89B6530280B7A85F998A806E1648911C37B6983BA9426 |
SHA-512: | 8599200F472F2D59390E8F2C497331640B12AB9FAF71817160C6D450EDF8A99F78CEF28CC3B57581D6AECFC1EC90A49947A6685C606321B6EE300D483C838360 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 433786 |
Entropy (8bit): | 1.255949132332751 |
Encrypted: | false |
SSDEEP: | 768:NFXORpsqJLOaVDzzoIgUPRGRoYNxHVxyczaUz4pP9Nom56I4tY6UBh1Yc88LaAQo:TUAoYxPzqoIzdwWR1+/24cwZXeCPiIBo |
MD5: | 53FF1A157920AE92C9BF891D453D6B65 |
SHA1: | B7BF3B7B16048F38132D8ACCA841130D73DB44C3 |
SHA-256: | FAD1B5E641DC44B5A51048470D4E0FB47664CF2B994CEA24304495D99323B9DE |
SHA-512: | E739381C24627F89255DB55B2DA39A09F055A322C577C3604BA048FB2C817AE7F63B12131F8461491F6140953FB33DD94EB66D8CB3B13B36717143342CE270AF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 374902 |
Entropy (8bit): | 1.250991222921627 |
Encrypted: | false |
SSDEEP: | 1536:XkYzjcLYszRzU5n1C900tMkYQx+gnpovYHO:XkYz4DzQB5sYYH |
MD5: | 169115C751DDA5E021E8C86E8454B26D |
SHA1: | 5A8254634C0C726BB18E42E626EAEB581D532DCD |
SHA-256: | ACCD4911D88E808AED4A2AA27394628C62574810B0B47977B7103A246FDF2A10 |
SHA-512: | 2B643014E8623CADBA7CE78B91D3C751D60FCBF3FA69FA26F29A14E55679FC6A5C2074834B2496773A1756E3172EC7C898E2DF29CB4A0513DBF8BC0DCDDA7E04 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489048 |
Entropy (8bit): | 1.245615736901525 |
Encrypted: | false |
SSDEEP: | 1536:HMtjgMjMD1whyMu1IXCVAcFNpruXO+nBJH:stjgmYi03XDL+nBJ |
MD5: | B4FB425BAF217F31E91AAB39ABF66DCD |
SHA1: | 03DE3BD0F923AB14213B6C4461C5CA73A0A6371C |
SHA-256: | 4BC57A47B82B63EC20B393F65F3585EB81FE3F7748229CD19DEC8FE8A41D67C3 |
SHA-512: | E72395FD6098130EFD543C5941781A1AA80FCE17C7701CB40FA8874271E0D43E0F7F082EBF5D458181287DE41CF4B34F88DCAABE84D8AD51003EF5DA1495D871 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 371 |
Entropy (8bit): | 4.247837387326688 |
Encrypted: | false |
SSDEEP: | 6:r8pLNAsEyv1WABlvMW9uu+IXvVJyQXPhXOQemtNxgFUvNwmA6AQOp2jMPA9cnb:ruJAOgABlQuTXbyKhXOLmtLgHmFOYjMV |
MD5: | 46003C65AA12A0EBE55662F0141186DC |
SHA1: | 739652C3375018DAFFB986302A7D3E8D32770B41 |
SHA-256: | 2EA079DEDE1B356842C5F5E0751B5E2B6565FDED65DAFB59A73D170C002ABB27 |
SHA-512: | 59D394789F9EECE97873D56AEA64F353D3E13E007E4ACBD396AC76CB68E91494EB65888049EF05CBE9B20597ADADCC960D067F90AAD3EA5AA46AC3A82F5B82FD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Quote_220072.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 146596 |
Entropy (8bit): | 4.598858103844812 |
Encrypted: | false |
SSDEEP: | 1536:VVHH1QAyhbDPjvaN4sRBeriRh7VkKfMyRaCjXavNDYqlgGka5OHV6heD7qI000C/:THHuAkzY4yKKf7sC2vNEqaZ/6hrI0FC/ |
MD5: | E9809833C54E3AD937C0891484E15A3A |
SHA1: | 64A1D652A38FFD8070B5C110B5D841FCE3B50B88 |
SHA-256: | 1B992AE5A6C0402C451B53C5E4202BD68D563AB416002C16481F128C8943CC2E |
SHA-512: | 1A065EC17F3D780BF38C163C10C7F89F2AEE7E7A5DE199FE52A0E2555696B0A5FEF6DE39383A7CEF8F23F7CBF3821207BD5F49E3DB19394159A30330BB9011FE |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.812466755832812 |
TrID: |
|
File name: | Quote_220072.exe |
File size: | 1'197'664 bytes |
MD5: | ac900546c8bf5b3be3184502d0d2d7ba |
SHA1: | 6427b2e160082bdb6a5b0213a3de348986f31530 |
SHA256: | 23df64fa762b5942d08dc6bf6f5afc75fc932519a96070af492e237b5483747f |
SHA512: | 4b6bcd3c9413177629668f37160372b65c598a4c5c2ab7eae0905074761e49105b6e954fcfdccae11501120fba4a2dd59d477eab76911a6dd94e184bd7afeb56 |
SSDEEP: | 24576:T4nhDoAFBOCmg1OJnkFWsksVBNF/ZNXLGQ7WczkxFnfbP97:T+hkcOCm+OWFW+V5BNXKQKczgt |
TLSH: | 6F45232976A7C08FEA820A385AF7E33BD67AFD102D25852777602B4EFD3528CDD56110 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............o...o...o...k...o...i...o...n...o...n...o.I.k...o.I.....o.I.m...o.Rich..o.................PE..L...!.*c.................n. |
Icon Hash: | 873335651170390f |
Entrypoint: | 0x4036da |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x632AE721 [Wed Sep 21 10:27:45 2022 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 3f91aceea750f765ef2ba5d9988e6a00 |
Signature Valid: | false |
Signature Issuer: | CN=Selvbinderes, O=Selvbinderes, L=Paris 03, C=FR |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 2DC2FC958F31DF7E02B170AC81A27DCD |
Thumbprint SHA-1: | 22F659C317C7A886E7364E0F3607F3C379B61AF4 |
Thumbprint SHA-256: | C191C38E37D3B3A2571E1406691B55FC305D47268B0DC2B40CBB934A663AFAEC |
Serial: | 234BC0FC872A6A06C77E178A22EF69418C6CA6A1 |
Instruction |
---|
sub esp, 000003ECh |
push ebx |
push ebp |
push esi |
push edi |
xor ebx, ebx |
mov edi, 00408528h |
push 00008001h |
mov dword ptr [esp+14h], ebx |
mov ebp, ebx |
call dword ptr [00408170h] |
mov esi, dword ptr [004080ACh] |
lea eax, dword ptr [esp+2Ch] |
xorps xmm0, xmm0 |
mov dword ptr [esp+40h], ebx |
push eax |
movlpd qword ptr [esp+00000144h], xmm0 |
mov dword ptr [esp+30h], 0000011Ch |
call esi |
test eax, eax |
jne 00007F27F514A7B9h |
lea eax, dword ptr [esp+2Ch] |
mov dword ptr [esp+2Ch], 00000114h |
push eax |
call esi |
push 00000053h |
pop eax |
mov dl, 04h |
mov byte ptr [esp+00000146h], dl |
cmp word ptr [esp+40h], ax |
jne 00007F27F514A793h |
mov eax, dword ptr [esp+5Ah] |
add eax, FFFFFFD0h |
mov word ptr [esp+00000140h], ax |
jmp 00007F27F514A78Dh |
xor eax, eax |
jmp 00007F27F514A774h |
mov dl, byte ptr [esp+00000146h] |
cmp dword ptr [esp+30h], 0Ah |
jnc 00007F27F514A78Dh |
movzx eax, word ptr [esp+38h] |
mov dword ptr [esp+38h], eax |
jmp 00007F27F514A786h |
mov eax, dword ptr [esp+38h] |
mov dword ptr [007A8638h], eax |
movzx eax, byte ptr [esp+30h] |
shl ax, 0008h |
movzx ecx, ax |
movzx eax, byte ptr [esp+34h] |
or ecx, eax |
movzx eax, byte ptr [esp+00000140h] |
shl ax, 0008h |
shl ecx, 10h |
movzx eax, word ptr [eax] |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8a00 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x3db000 | 0x3e910 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x123448 | 0x1218 | .data |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2b0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6c0b | 0x6e00 | 9178309eee1a86dc5ef945d6826a6897 | False | 0.6605823863636363 | data | 6.398414552532143 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x1896 | 0x1a00 | 0885e83a553c38819d1fab2908ca0cf5 | False | 0.4307391826923077 | data | 4.86610208699674 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x39e640 | 0x200 | 5c0f03a1a77f205400c2cbabec9976c4 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x3a9000 | 0x32000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x3db000 | 0x3e910 | 0x3ea00 | 2690c3c0c1de505f961321c7e2d6da34 | False | 0.6915076097804391 | data | 6.574790239627466 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x3db388 | 0x16482 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States | 1.000394451383867 |
RT_ICON | 0x3f1810 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.486498876138649 |
RT_ICON | 0x402038 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.5308492747529956 |
RT_ICON | 0x40b4e0 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.5497227356746766 |
RT_ICON | 0x410968 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.5415682569674067 |
RT_ICON | 0x414b90 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.5884854771784233 |
RT_ICON | 0x417138 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.6179643527204502 |
RT_ICON | 0x4181e0 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.6668032786885246 |
RT_ICON | 0x418b68 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7287234042553191 |
RT_DIALOG | 0x418fd0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x4190d0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x4191f0 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x4192b8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x419318 | 0x84 | Targa image data - Map 32 x 25730 x 1 +1 | English | United States | 0.7348484848484849 |
RT_VERSION | 0x4193a0 | 0x220 | data | English | United States | 0.5110294117647058 |
RT_MANIFEST | 0x4195c0 | 0x349 | XML 1.0 document, ASCII text, with very long lines (841), with no line terminators | English | United States | 0.5529131985731273 |
DLL | Import |
---|---|
ADVAPI32.dll | RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW |
SHELL32.dll | ShellExecuteExW, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetSpecialFolderLocation |
ole32.dll | OleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance |
COMCTL32.dll | ImageList_Destroy, ImageList_AddMasked, ImageList_Create |
USER32.dll | DispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, PeekMessageW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, SetDlgItemTextW, GetDlgItemTextW, CharNextA, MessageBoxIndirectW, RegisterClassW, CharPrevW, LoadCursorW |
GDI32.dll | SetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW |
KERNEL32.dll | WriteFile, GetLastError, WaitForSingleObject, GetExitCodeProcess, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, RemoveDirectoryW, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-01T12:14:50.254129+0100 | 2030171 | ET MALWARE AgentTesla Exfil Via SMTP | 1 | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
2024-11-01T12:14:50.254129+0100 | 2839723 | ETPRO MALWARE Win32/Agent Tesla SMTP Activity | 1 | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
2024-11-01T12:14:50.254129+0100 | 2840032 | ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 | 1 | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
2024-11-01T12:15:13.891888+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.109.210.53 | 443 | 192.168.2.9 | 49735 | TCP |
2024-11-01T12:15:39.027883+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.9 | 49738 | 172.217.18.14 | 443 | TCP |
2024-11-01T12:15:46.463898+0100 | 2855245 | ETPRO MALWARE Agent Tesla Exfil via SMTP | 1 | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
2024-11-01T12:15:46.463898+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.9 | 49740 | 199.79.62.115 | 587 | TCP |
2024-11-01T12:15:52.715680+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.109.210.53 | 443 | 192.168.2.9 | 49741 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 1, 2024 12:15:37.731329918 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:37.731384993 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:37.731466055 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:37.742582083 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:37.742623091 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:38.604748964 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:38.604890108 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:38.605706930 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:38.605784893 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:38.658992052 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:38.659020901 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:38.659348011 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:38.659394979 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:38.662451982 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:38.707334042 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:39.027863979 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:39.028007030 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:39.028042078 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:39.028101921 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:39.028166056 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:39.028206110 CET | 443 | 49738 | 172.217.18.14 | 192.168.2.9 |
Nov 1, 2024 12:15:39.028296947 CET | 49738 | 443 | 192.168.2.9 | 172.217.18.14 |
Nov 1, 2024 12:15:39.053014040 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.053047895 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:39.053118944 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.053391933 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.053401947 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:39.953433990 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:39.953509092 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.970211029 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.970262051 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:39.970966101 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:39.971055031 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:39.975683928 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:40.023360014 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.388942957 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.389147043 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.397880077 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.398010015 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.505563974 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.505665064 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.505672932 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.505702019 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.505717993 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.505738974 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.518935919 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.519042969 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.519052029 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.519093037 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.523683071 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.523751974 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.523757935 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.523792982 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.533142090 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.533229113 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.533235073 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.533293962 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.542695045 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.542762041 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.542768002 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.542808056 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.552226067 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.552289009 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.552293062 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.552305937 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.552329063 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.552361012 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.561755896 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.561811924 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.561817884 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.561997890 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.571472883 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.571568012 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.571597099 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.571655035 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.581033945 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.581101894 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.581127882 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.581195116 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.622879028 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623003006 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623028040 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623090029 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623095989 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623135090 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623146057 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623189926 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623231888 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623272896 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623343945 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623382092 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623652935 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623698950 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.623735905 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.623785019 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.636219978 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.636305094 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.636313915 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.636367083 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.649843931 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.649909973 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.649960041 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.650006056 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.653074980 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.653121948 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.653127909 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.653172970 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676642895 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676728010 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676733017 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676742077 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676770926 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676779985 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676800966 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676805973 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676820993 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676846027 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.676954985 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.676994085 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.677006006 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.677052975 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.678359032 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.678411961 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.678416014 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.678457022 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.684484005 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.684544086 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.684547901 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.684597015 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.690567017 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.690634966 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.690639973 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.690684080 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.697021961 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.697227955 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.697233915 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.697289944 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.703300953 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.703363895 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.703391075 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.703437090 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.709171057 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.709258080 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.709264994 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.709376097 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.715871096 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.715961933 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.715967894 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.716033936 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.721497059 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.721606970 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.721631050 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.721703053 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.727798939 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.727883101 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.727905035 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.727953911 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.733967066 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.734055996 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.734072924 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.734143019 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.739945889 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.740041971 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.740067959 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.740247011 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.746268034 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.746368885 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.746387959 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.746454954 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.752331018 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.752429008 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.752453089 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.752540112 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.758270979 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.758373022 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.758394957 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.758461952 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.764234066 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.764332056 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.764343977 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.764400005 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.770123959 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.770226955 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.770250082 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.770334959 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.775584936 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.775671959 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.775693893 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.775742054 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.781140089 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.781236887 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.781248093 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.781327009 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.786701918 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.786818981 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.786839008 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.786925077 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.790564060 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.790666103 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.790677071 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.790828943 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.794128895 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.794210911 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.794215918 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.794259071 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.797557116 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.797661066 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.797679901 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.797727108 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.801078081 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.801139116 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.801148891 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.801186085 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.804506063 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.804558992 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.804569960 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.804615974 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.807979107 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.808022976 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.808032990 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.808064938 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.811893940 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.811950922 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.811954975 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.811994076 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.814860106 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.814910889 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.814917088 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.814949989 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.818348885 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.818427086 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.818437099 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.818492889 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.821562052 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.821615934 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.821630001 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.821671963 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.825148106 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.825213909 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.825243950 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.825289965 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.828289032 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.828337908 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.828711033 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.828754902 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.831456900 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.831517935 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.831522942 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.831559896 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.834331989 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.834387064 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.834391117 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.834433079 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.837939024 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.837989092 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.837994099 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.838033915 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.840610981 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.840662956 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.840673923 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.840744019 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.843727112 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.843790054 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.843796968 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.843847036 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.846811056 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.846869946 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.847163916 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.847213030 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.849706888 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.849757910 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.849762917 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.849869013 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.849872112 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.849920034 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.849972963 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:42.850008965 CET | 443 | 49739 | 142.250.185.193 | 192.168.2.9 |
Nov 1, 2024 12:15:42.850056887 CET | 49739 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 1, 2024 12:15:44.671127081 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:44.676314116 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:44.677177906 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:45.398843050 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.399593115 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:45.405009031 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.553205013 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.554178953 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:45.559123039 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.707318068 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.708534956 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:45.713418007 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.981354952 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:45.981822968 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:45.986687899 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.142847061 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.143258095 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.148291111 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.309142113 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.309415102 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.314287901 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.462965012 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.463841915 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.463897943 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.463920116 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.463938951 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Nov 1, 2024 12:15:46.468921900 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.468960047 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.468969107 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.468976974 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.618818045 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 |
Nov 1, 2024 12:15:46.672813892 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 1, 2024 12:15:37.719043970 CET | 50828 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 1, 2024 12:15:37.725857019 CET | 53 | 50828 | 1.1.1.1 | 192.168.2.9 |
Nov 1, 2024 12:15:39.045264006 CET | 53787 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 1, 2024 12:15:39.052170992 CET | 53 | 53787 | 1.1.1.1 | 192.168.2.9 |
Nov 1, 2024 12:15:44.376378059 CET | 52736 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 1, 2024 12:15:44.665628910 CET | 53 | 52736 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 1, 2024 12:15:37.719043970 CET | 192.168.2.9 | 1.1.1.1 | 0x288f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 12:15:39.045264006 CET | 192.168.2.9 | 1.1.1.1 | 0x9847 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 1, 2024 12:15:44.376378059 CET | 192.168.2.9 | 1.1.1.1 | 0x4b3d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 84.201.210.22 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 217.20.57.26 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 217.20.57.21 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 84.201.210.39 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 217.20.57.41 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:14:50.261038065 CET | 1.1.1.1 | 192.168.2.9 | 0x552e | No error (0) | 84.201.210.35 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:15:37.725857019 CET | 1.1.1.1 | 192.168.2.9 | 0x288f | No error (0) | 172.217.18.14 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:15:39.052170992 CET | 1.1.1.1 | 192.168.2.9 | 0x9847 | No error (0) | 142.250.185.193 | A (IP address) | IN (0x0001) | false | ||
Nov 1, 2024 12:15:44.665628910 CET | 1.1.1.1 | 192.168.2.9 | 0x4b3d | No error (0) | 199.79.62.115 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49738 | 172.217.18.14 | 443 | 7888 | C:\Users\user\Desktop\Quote_220072.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-01 11:15:38 UTC | 216 | OUT | |
2024-11-01 11:15:39 UTC | 1610 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.9 | 49739 | 142.250.185.193 | 443 | 7888 | C:\Users\user\Desktop\Quote_220072.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-01 11:15:39 UTC | 258 | OUT | |
2024-11-01 11:15:42 UTC | 4926 | IN | |
2024-11-01 11:15:42 UTC | 4926 | IN | |
2024-11-01 11:15:42 UTC | 4846 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN | |
2024-11-01 11:15:42 UTC | 1378 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 1, 2024 12:15:45.398843050 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 220-md-54.webhostbox.net ESMTP Exim 4.96.2 #2 Fri, 01 Nov 2024 16:45:45 +0530 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Nov 1, 2024 12:15:45.399593115 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | EHLO 035347 |
Nov 1, 2024 12:15:45.553205013 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 250-md-54.webhostbox.net Hello 035347 [173.254.250.82] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP |
Nov 1, 2024 12:15:45.554178953 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | AUTH login c2FsZXNzQG1iYXJpZXNlcnZpY2VzbHRkLmNvbQ== |
Nov 1, 2024 12:15:45.707318068 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 334 UGFzc3dvcmQ6 |
Nov 1, 2024 12:15:45.981354952 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 235 Authentication succeeded |
Nov 1, 2024 12:15:45.981822968 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | MAIL FROM:<saless@mbarieservicesltd.com> |
Nov 1, 2024 12:15:46.142847061 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 250 OK |
Nov 1, 2024 12:15:46.143258095 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | RCPT TO:<iinfo@mbarieservicesltd.com> |
Nov 1, 2024 12:15:46.309142113 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 250 Accepted |
Nov 1, 2024 12:15:46.309415102 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | DATA |
Nov 1, 2024 12:15:46.462965012 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 354 Enter message, ending with "." on a line by itself |
Nov 1, 2024 12:15:46.463938951 CET | 49740 | 587 | 192.168.2.9 | 199.79.62.115 | . |
Nov 1, 2024 12:15:46.618818045 CET | 587 | 49740 | 199.79.62.115 | 192.168.2.9 | 250 OK id=1t6pd4-003nCJ-1F |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 07:14:54 |
Start date: | 01/11/2024 |
Path: | C:\Users\user\Desktop\Quote_220072.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'197'664 bytes |
MD5 hash: | AC900546C8BF5B3BE3184502D0D2D7BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 07:15:26 |
Start date: | 01/11/2024 |
Path: | C:\Users\user\Desktop\Quote_220072.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'197'664 bytes |
MD5 hash: | AC900546C8BF5B3BE3184502D0D2D7BA |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 30.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 16.5% |
Total number of Nodes: | 826 |
Total number of Limit Nodes: | 19 |
Graph
Function 004036DA Relevance: 84.4, APIs: 32, Strings: 16, Instructions: 416stringfilecomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF82351 Relevance: 18.7, APIs: 12, Instructions: 705stringlibrarymemoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004066F7 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 155filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004065AD Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404F70 Relevance: 63.4, APIs: 35, Strings: 1, Instructions: 374windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A1C Relevance: 45.7, APIs: 13, Strings: 13, Instructions: 225stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040154A Relevance: 35.4, APIs: 17, Strings: 3, Instructions: 441stringtimesleepCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004033CB Relevance: 21.2, APIs: 5, Strings: 7, Instructions: 178memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E98 Relevance: 19.5, APIs: 7, Strings: 4, Instructions: 209stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D18 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 76stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040617C Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068C4 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 18libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E1C Relevance: 6.0, APIs: 4, Instructions: 37COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406955 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 47registryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF8167A Relevance: 4.6, APIs: 3, Instructions: 123COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401399 Relevance: 3.0, APIs: 2, Instructions: 49windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406616 Relevance: 3.0, APIs: 2, Instructions: 47stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004066B4 Relevance: 3.0, APIs: 2, Instructions: 24processCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068F9 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF82D14 Relevance: 1.6, APIs: 1, Instructions: 143fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004069E9 Relevance: 1.5, APIs: 1, Instructions: 24fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406926 Relevance: 1.5, APIs: 1, Instructions: 24fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF81A4A Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004054C6 Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004054E1 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403131 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062E4 Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 124memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405739 Relevance: 12.1, APIs: 8, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040362D Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 38timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF810C7 Relevance: 8.9, APIs: 7, Instructions: 162memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF81F1E Relevance: 8.8, APIs: 2, Strings: 3, Instructions: 28stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF82049 Relevance: 7.6, APIs: 5, Instructions: 129memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF81F7B Relevance: 7.5, APIs: 5, Instructions: 38memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406534 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6FF81CC7 Relevance: 6.2, APIs: 4, Instructions: 209COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403367 Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.1% |
Dynamic/Decrypted Code Coverage: | 96.5% |
Signature Coverage: | 0% |
Total number of Nodes: | 85 |
Total number of Limit Nodes: | 5 |
Graph
Function 37933608 Relevance: .3, Instructions: 338COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379302B8 Relevance: 42.2, Strings: 33, Instructions: 903COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3488AE22 Relevance: 6.1, APIs: 4, Instructions: 131threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3488AE28 Relevance: 6.1, APIs: 4, Instructions: 128threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3791E6AC Relevance: 1.6, APIs: 1, Instructions: 117COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3791E6B8 Relevance: 1.6, APIs: 1, Instructions: 113COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 377E1B20 Relevance: 1.6, APIs: 1, Instructions: 93COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3488B06A Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3488B070 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 377E4460 Relevance: 1.5, APIs: 1, Instructions: 48comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 377E3148 Relevance: 1.5, APIs: 1, Instructions: 46comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37933530 Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37933540 Relevance: 1.3, Strings: 1, Instructions: 59COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37933C30 Relevance: .4, Instructions: 382COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37932C33 Relevance: .2, Instructions: 191COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37932C38 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379332C8 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37933AA0 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 37933FF0 Relevance: .1, Instructions: 127COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3470D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 3470D007 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379323E8 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379335F8 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379323F8 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 346FD628 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 379332B8 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040617C Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004068C4 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 18libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|