Windows
Analysis Report
MYuRWuVXzX.dll
Overview
General Information
Sample name: | MYuRWuVXzX.dll (renamed file extension from exe to dll, renamed because original name is a hash value) |
Original sample name: | 9bb9978d1c6507e3368f7b8f48041fc8a5ddfc02.dll.exe |
Analysis ID: | 1558483 |
MD5: | 7b857fe6c2149e304d6866602fef9d6f |
SHA1: | 9bb9978d1c6507e3368f7b8f48041fc8a5ddfc02 |
SHA256: | 78bc725cae147ff1836bedaf04336e7652dbaf9d7a25aae66322edd83f9dcb20 |
Tags: | dllexeuser-NDA0E |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll32.exe (PID: 7564 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\MYu RWuVXzX.dl l" MD5: 51E6071F9CBA48E79F10C84515AAE618) - conhost.exe (PID: 7572 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 7616 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\MYu RWuVXzX.dl l",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - rundll32.exe (PID: 7640 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\MYuR WuVXzX.dll ",#1 MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7696 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7724 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 7768 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12) - rundll32.exe (PID: 7624 cmdline:
rundll32.e xe C:\User s\user\Des ktop\MYuRW uVXzX.dll, Cache MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 7896 cmdline:
rundll32.e xe C:\User s\user\Des ktop\MYuRW uVXzX.dll, InputFile MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 7924 cmdline:
rundll32.e xe C:\User s\user\Des ktop\MYuRW uVXzX.dll, PrintFile MD5: 889B99C52A60DD49227C5E485A016679) - WerFault.exe (PID: 8004 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 924 -s 672 MD5: C31336C1EFC2CCB44B4326EA793040F2) - rundll32.exe (PID: 8132 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\MYuR WuVXzX.dll ",Cache MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7192 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7212 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 3284 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12) - rundll32.exe (PID: 8140 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\MYuR WuVXzX.dll ",InputFil e MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 8152 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\MYuR WuVXzX.dll ",PrintFil e MD5: 889B99C52A60DD49227C5E485A016679) - WerFault.exe (PID: 7312 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 8 152 -s 668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- rundll32.exe (PID: 4248 cmdline:
"C:\Window s\SysWOW64 \rundll32. exe" "C:\U sers\user\ Desktop\MY uRWuVXzX.d ll",Cache MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7536 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 7548 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
- rundll32.exe (PID: 7700 cmdline:
"C:\Window s\SysWOW64 \rundll32. exe" "C:\U sers\user\ Desktop\MY uRWuVXzX.d ll",Cache MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7744 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7808 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 1108 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
| |
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
| |
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
|
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | TCP traffic: |
Source: | Process created: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 3_2_10003F41 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 3_2_10008AAD |
Source: | Code function: | 3_2_10003F63 | |
Source: | Code function: | 11_2_10003F63 | |
Source: | Code function: | 18_2_10003F63 |
Source: | Code function: | 3_2_1003D000 | |
Source: | Code function: | 3_2_1000B224 | |
Source: | Code function: | 3_2_1000B70D | |
Source: | Code function: | 3_2_1000AEC0 | |
Source: | Code function: | 3_2_1003CFE9 | |
Source: | Code function: | 11_2_1000B224 | |
Source: | Code function: | 11_2_1000B70D | |
Source: | Code function: | 11_2_1000AEC0 | |
Source: | Code function: | 18_2_1000B224 | |
Source: | Code function: | 18_2_1000B70D | |
Source: | Code function: | 18_2_1000AEC0 |
Source: | Process created: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 3_2_100042A2 | |
Source: | Code function: | 3_2_1000404F | |
Source: | Code function: | 11_2_1000404F | |
Source: | Code function: | 18_2_1000404F |
Source: | Code function: | 3_2_10003FB7 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 3_2_10026C0E | |
Source: | Code function: | 3_2_10038D03 | |
Source: | Code function: | 3_2_10033DDA | |
Source: | Code function: | 3_2_10029011 | |
Source: | Code function: | 3_2_1002CDC2 | |
Source: | Code function: | 3_2_10039A4E | |
Source: | Code function: | 3_2_1002D942 | |
Source: | Code function: | 3_2_1003796A | |
Source: | Code function: | 3_2_10039030 | |
Source: | Code function: | 3_2_1002302F | |
Source: | Code function: | 3_2_1003A0F3 | |
Source: | Code function: | 3_2_1002B034 | |
Source: | Code function: | 3_2_1003A0F3 | |
Source: | Code function: | 3_2_10021025 | |
Source: | Code function: | 3_2_1002104B | |
Source: | Code function: | 3_2_1002F039 | |
Source: | Code function: | 3_2_1002303E | |
Source: | Code function: | 3_2_1003104A | |
Source: | Code function: | 3_2_10037046 | |
Source: | Code function: | 3_2_1003504C | |
Source: | Code function: | 3_2_10029035 | |
Source: | Code function: | 3_2_10030345 | |
Source: | Code function: | 3_2_100341A0 | |
Source: | Code function: | 3_2_10023056 | |
Source: | Code function: | 3_2_1002105C | |
Source: | Code function: | 3_2_100341A0 | |
Source: | Code function: | 3_2_1002B066 | |
Source: | Code function: | 3_2_10033073 | |
Source: | Code function: | 3_2_10021085 | |
Source: | Code function: | 3_2_1002507B | |
Source: | Code function: | 3_2_1002B08E |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | Code function: | 3_2_10008B7A |
Boot Survival |
---|
Source: | Code function: | 3_2_10008B7A |
Source: | Registry value created or modified: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_3-22947 |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Code function: | 3_2_1003D000 |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Evasive API call chain: | graph_3-22933 |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_1003D000 |
Source: | Code function: | 11_2_1000CCF2 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 11 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 3 Obfuscated Files or Information | LSASS Memory | 111 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Bootkit | 111 Process Injection | 1 Software Packing | Security Account Manager | 31 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 11 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 1 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Masquerading | LSA Secrets | 1 Process Discovery | SSH | Keylogging | 1 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 31 Virtualization/Sandbox Evasion | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Access Token Manipulation | DCSync | 1 Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 111 Process Injection | Proc Filesystem | 1 System Network Configuration Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 Bootkit | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
IP Addresses | Compromise Infrastructure | Supply Chain Compromise | PowerShell | Cron | Cron | 1 Rundll32 | Network Sniffing | Network Service Discovery | Shared Webroot | Local Data Staging | File Transfer Protocols | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | External Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | Win32.Backdoor.Zegost | ||
100% | Avira | TR/ATRAPS.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
blogx.sina.com.cn | 202.108.0.52 | true | false | high | |
blog.sina.com.cn | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
202.108.0.52 | blogx.sina.com.cn | China | 4808 | CHINA169-BJChinaUnicomBeijingProvinceNetworkCN | false | |
107.163.56.110 | unknown | United States | 20248 | TAKE2US | true | |
174.139.6.44 | unknown | United States | 35908 | VPLSNETUS | true | |
174.139.6.43 | unknown | United States | 35908 | VPLSNETUS | true | |
174.139.6.42 | unknown | United States | 35908 | VPLSNETUS | true |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1558483 |
Start date and time: | 2024-11-19 14:14:20 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 50s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 37 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | MYuRWuVXzX.dll (renamed file extension from exe to dll, renamed because original name is a hash value) |
Original Sample Name: | 9bb9978d1c6507e3368f7b8f48041fc8a5ddfc02.dll.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winDLL@42/10@3/6 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.22, 20.189.173.21
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com
- Execution Graph export aborted for target rundll32.exe, PID 7924 because it is empty
- Execution Graph export aborted for target rundll32.exe, PID 8152 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtDeviceIoControlFile calls found.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: MYuRWuVXzX.dll
Time | Type | Description |
---|---|---|
08:15:23 | API Interceptor | |
08:15:30 | API Interceptor | |
08:18:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
202.108.0.52 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
107.163.56.110 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
blogx.sina.com.cn | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CHINA169-BJChinaUnicomBeijingProvinceNetworkCN | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
VPLSNETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
VPLSNETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TAKE2US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Windows\SysWOW64\rundll32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 436 |
Entropy (8bit): | 4.293110913986001 |
Encrypted: | false |
SSDEEP: | 6:yFOVOf7EazNqz9S0fUxLcF3HZjnjQeI+eeeeeeeeeeeeeeeA:8eOfAaz45S0sx85jnjQeIJpppppppA |
MD5: | CB3AD9F834BCA003ECC48361D7870540 |
SHA1: | 8CABD8F9012D53BBF24A57597B31ED0A6F85AA3C |
SHA-256: | 7EB43DF65CBD527A9E76DE503E012DEC1D64135310BFCAB8F7C3ED2B921A4CDD |
SHA-512: | 018E8E17FB8817B02B16741E87CD85F5A2A08C3EFF215400B5084649B414E5BED0FDAA45A95FD87D55B5FC4334E9C411079EB984E0D9110C8139DA30F4D7F6AE |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d2d6a05f617930bde2d4c76b2a5555e299272ba9_7522e4b5_5eb2d3d4-e5f5-4c1d-a11d-a7ed1d40f08d\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9508546862759144 |
Encrypted: | false |
SSDEEP: | 192:WEi1OK+730BU/wjeT93WaZYzuiFMZ24IO8dci:5isJEBU/wjeZbYzuiFMY4IO8dci |
MD5: | 66763FB1E9794703720698870D56F479 |
SHA1: | 05DA5D5EBEC78D5DAB0CE2CA7E3B3EB9AB94E956 |
SHA-256: | 7B4D2E8B88596F8F60E0361A288813E6F265C0FD2E1ECCC7A9C9FD4A6EDEAEF5 |
SHA-512: | 19DC4A581322E77D11B381B9A6ADD828C3D3C0A4EA12FADF94886004B2A57CEDB641C570128D4A407EBFC0611FE98C88479955A9DACE1AF6E2371D4AC32F8DEF |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_fee72e296cfe876676a0f903eac30ffbede4e6_7522e4b5_04d508df-b13c-449b-9b64-bcd97878548d\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9514027808155535 |
Encrypted: | false |
SSDEEP: | 192:pRniAOGv0BU/wjeT93W6ZYzuiFnZ24IO8dci:pRixGcBU/wjeZ7YzuiFnY4IO8dci |
MD5: | 8194A9A24D686570E2B92FD6CB5F8826 |
SHA1: | 81CEDD0FD63904D010CA5BDDA67B6B1979495F37 |
SHA-256: | 39C3E3749E8918DA0A6758B941897D506DE0D233A7D0BED38CAA9C48D8342DB2 |
SHA-512: | 5CA6DE658B5A72737349EE1D52EE2463D62D94473F7D6B69B5A9B8A9A86B2F4DA2BA6323F862BB6CAA8FFD7DB937E3F012892A6509EE110EA78A14DB150F6C19 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46216 |
Entropy (8bit): | 1.9794755714100396 |
Encrypted: | false |
SSDEEP: | 192:ssPTy2DtjZJMXtXWmO5H40lr4H9xGwb/yBQUzaf:3bjZJdx5HxF4H9xbaBK |
MD5: | 9E389B04446927D94D59BFFE9D0A40D4 |
SHA1: | 56A3124A48685653FA75A3B726AA77ADE71B9649 |
SHA-256: | A319A4AAFCB3166852F5175E51DE84AE81FF36D68D173E6505487A5296288A57 |
SHA-512: | 15CF2900F8632A4356FC0C6EEEB184490916B7908630777BB6739C59008BC9DCAEADCFC6AFC9D526D69C1D049D72823D825F1DC4AC6FADF3F5961DEF96FD87E8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8274 |
Entropy (8bit): | 3.6940569434549695 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJ9a6SXCWUX6YSs65icgmfTxPprr89brLsfiZm:R6lXJA6iY6Yp6ocgmfTxOrQfV |
MD5: | D20F02B26842ECD11FDE3304B191796E |
SHA1: | FB9290ABEB980E35625B39222AED0BB2217CA385 |
SHA-256: | 1BB1040ADEFE6051AD013B9F9AF84ADB17FEF59DCA0611BADE28A3574CD99A34 |
SHA-512: | 8526B006F93AC78437E8C5EA3CE2346C59276DD3907529C8636AAA9F041AA7E2F2BDEF2D85C88858F89364BE5AEC65DB1BF85B82AAE61A918C760E639D353B12 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4654 |
Entropy (8bit): | 4.460320859358136 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsuNJg77aI9ojWpW8VYFYm8M4JCdPOFvK+q8/A8GScSUd:uIjfunI72S7VlJWEJ3Ud |
MD5: | B0F66A1DCD7B3FC16FA4861704DE4867 |
SHA1: | D081775A758D35BF1A0C332769B3C6056E183254 |
SHA-256: | E9AD80C33C481A321A5E4981C20C275485024B341B5540BD9E0071FFA7688960 |
SHA-512: | B06C74A086F84FDA0578181F662243B72AE7FE9FBC07C05212A5763129468F6CFE6EBA1E29C63897CDFCFBEFE74D82FFFF6F3DB6C6158F4C784B4316FD4C1BB5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 45442 |
Entropy (8bit): | 1.996063253461622 |
Encrypted: | false |
SSDEEP: | 192:JwPHVvZ53MXtX2JYOO5H4svr/5XNEmYy9VATcrJS:wRZ53jWJ5HJvr/pNEmYy9VrJ |
MD5: | A68BC57EB8F28ABC95A8A5DC46F4D8D1 |
SHA1: | 20CE03308B78EE84743042F9649154968CC0971F |
SHA-256: | 783D22EEE56DE0184D935EB041E734BB988B95B3A9FFB4C68BAD04B1E4BCD80C |
SHA-512: | 5560525BF803AF04ABC662BA166721CC95C1D47E3C938502FEBE2C1E79AA6171FB59690F69866F170886E6B244286DFCCD90322DF24ED79F0EBBF930403EF491 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8266 |
Entropy (8bit): | 3.688748163809048 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJr56rU6YiQi6n9gmfTZPprr89bC6sfi2m:R6lXJ16rU6Yni69gmfTZuCZfa |
MD5: | DCCC096D4F25E71833D3DF9A0469130F |
SHA1: | D431BBEAC8991D49A09D49A06EF5C85A828A1280 |
SHA-256: | 4670D56AC167F4F3D3E86EBDC2C24D70F0C3BDF1A7798F38C8FC5B883F7D2836 |
SHA-512: | CAB6BC848E3204B896845B9761DBC9B4453E21CC064A782AB06C8C5DBA3C1B10C69946F065593085EDB4E2C9CB56C43B40DB62A8BFE5E77D2834864848CF1C38 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4654 |
Entropy (8bit): | 4.458297620235706 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsuNJg77aI9ojWpW8VY6Ym8M4JCdPSFZ+q8/ABGScSeMd:uIjfunI72S7VOJxJJ37d |
MD5: | 06C6C47ABBF7CED9B220D5E9F0762ADA |
SHA1: | 8189DA923AD2234F7086FDBF239D8422E8E446E4 |
SHA-256: | 296CEAC8FC92030E2387DE3AB242FF4BFC4F4391A93918ABA0F16362CEEE69CF |
SHA-512: | 02F239B5B9194F51C8CF57CB3DFCDE510FEF6B32CD3F160920CF6DDB14CE3FF8D4B08B044495D17865550C3DC0B3B02F5456DD62A01F817F7E90E5938497DF56 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.417452535410101 |
Encrypted: | false |
SSDEEP: | 6144:mcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNo5+:Di58oSWIZBk2MM6AFBWo |
MD5: | 0A4195C8889E1B492EEC138DFAF4B2AD |
SHA1: | D50A1153DC2E4A370E5F05BE3A3DF056C27DF248 |
SHA-256: | 125DD136ADCB9354A1C78293A553F2E39994DDEE54A85175B56EE8401219636E |
SHA-512: | 54BC4752F1D1C86E5F5E7948271BE516D70FC54BD406F25EF6C2385027FEBE7DF7E2CAAB9C11F9ECF1A9D5DC2F7A3942FF0C3956A8EBB6E590C481338FEADED6 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.761135825722674 |
TrID: |
|
File name: | MYuRWuVXzX.dll |
File size: | 192'575 bytes |
MD5: | 7b857fe6c2149e304d6866602fef9d6f |
SHA1: | 9bb9978d1c6507e3368f7b8f48041fc8a5ddfc02 |
SHA256: | 78bc725cae147ff1836bedaf04336e7652dbaf9d7a25aae66322edd83f9dcb20 |
SHA512: | 23868f3914706486db398338a49fb6e8e2a327bd071b2fc318587926ff98c854a0f76a619d9c09743c76305cb3f1a95dc020d9c302c876cbce82394f24dafdee |
SSDEEP: | 3072:Cri0+utSCXQJdqByftkViecNemfh0N5Wlu/gX6ASMqsCAn+/B87CVKrNyGTbd:CyrJdqByftkVbgQen+p7obTbd |
TLSH: | 241412D0D913A0B1D84BB7B825DBCB1EF1243017A695CEB1E384B138BD6B66770B2761 |
File Content Preview: | MZ............................................................................................................................................................................................................................................................. |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x10065589 |
Entrypoint Section: | .est1 |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DLL |
DLL Characteristics: | |
Time Stamp: | 0x0 [Thu Jan 1 00:00:00 1970 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 0 |
OS Version Minor: | 0 |
File Version Major: | 0 |
File Version Minor: | 0 |
Subsystem Version Major: | 0 |
Subsystem Version Minor: | 0 |
Import Hash: | 2215f9a3d2de2463fea5e14bd0dbd9a7 |
Instruction |
---|
pushad |
mov dword ptr [esp+1Ch], 4EC6F962h |
pushad |
jmp 00007FAE594B1286h |
cmc |
clc |
neg al |
call 00007FAE594B0D39h |
and dl, ch |
jnle 00007FAE594B150Bh |
mov esi, AE5C2D87h |
sbb eax, F47CA4D3h |
mov esp, BC147CE4h |
les edi, fword ptr [esp+eax*8+6Ch] |
mov bh, 46h |
in al, AAh |
push ecx |
dec edi |
scasd |
cmp dword ptr [ecx-17h], C6C226C7h |
popad |
sbb al, DEh |
jne 00007FAE594B14EAh |
stc |
inc esi |
popad |
sbb eax, 7A8F1291h |
into |
ret |
xchg eax, edi |
or esi, A7E6ED61h |
iretd |
idiv dword ptr [esi+7Eh] |
add eax, AC42FF13h |
dec eax |
jmp far 6F15h : CE0A2E88h |
lodsb |
and al, C7h |
jns 00007FAE594B1510h |
js 00007FAE594B15CBh |
enter CA11h, F9h |
add dword ptr [ecx-4A688F27h], esp |
mov edi, 44BCA10Bh |
outsb |
xlatb |
sbb al, E5h |
pop ecx |
jmp far 1C03h : 0A56CBCCh |
inc ebp |
push cs |
xchg eax, esi |
jmp 00007FADE5DE6EA7h |
mov dword ptr [ebx+ebp*4-30h], ebp |
jmp far CC57h : 9DD5F69Dh |
movsb |
test edi, esi |
xchg eax, edi |
pop ecx |
or bh, byte ptr [eax] |
lea esi, ebp |
fst st(5) |
sub eax, 1DA52D55h |
pop ds |
xchg eax, esp |
lodsd |
dec edi |
call 00007FAE6632515Ch |
aad 15h |
mov ebp, 55A3F043h |
and byte ptr [ecx-7F2CCA25h], ah |
stc |
xchg eax, ecx |
retn 5028h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x58c5c | 0x61 | .est1 |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x58f74 | 0x118 | .est1 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x6b000 | 0x1000 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x6a000 | 0x98 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3e1c8 | 0x7c | .est1 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xc4ec | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0xe000 | 0x356b | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x12000 | 0x5fc8 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.est0 | 0x18000 | 0x25554 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.est1 | 0x3e000 | 0x2bf7d | 0x2c000 | 697364de1b5d873f98e514072c7a652b | False | 0.9808127663352273 | data | 7.967511124980014 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x6a000 | 0x98 | 0x1000 | 7f96a42c0ef6f25a1abe09ff6cc3a351 | False | 0.0361328125 | data | 0.2595957251572465 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.rsrc | 0x6b000 | 0x3ada | 0x1000 | 733a9747d76ee70ba08fe167216cb9e0 | False | 0.072998046875 | Matlab v4 mat-file (little endian) , numeric, rows 0, columns 1701670722, imaginary | 0.5998326230273214 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
AVI | 0x6b230 | 0xe00 | data | English | United States | 0.007352941176470588 |
AVI | 0x6c030 | 0xe00 | empty | English | United States | 0 |
AVI | 0x6ce30 | 0x1caa | empty | English | United States | 0 |
MUI | 0x6b110 | 0x120 | data | English | United States | 0.5763888888888888 |
DLL | Import |
---|---|
MFC42.DLL | |
MSVCRT.dll | malloc |
KERNEL32.dll | GetSystemDirectoryA |
USER32.dll | wsprintfA |
ADVAPI32.dll | OpenProcessToken |
WS2_32.dll | closesocket |
SHLWAPI.dll | PathIsDirectoryA |
ole32.dll | CoInitializeEx |
OLEAUT32.dll | VariantChangeType |
MSVCP60.dll | ?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z |
NETAPI32.dll | Netbios |
KERNEL32.dll | GetModuleFileNameW |
KERNEL32.dll | GetModuleHandleA, LoadLibraryA, LocalAlloc, LocalFree, GetModuleFileNameA, ExitProcess |
Name | Ordinal | Address |
---|---|---|
Cache | 1 | 0x10008645 |
InputFile | 2 | 0x1000678b |
PrintFile | 3 | 0x1000443d |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2024 14:15:25.968750000 CET | 49701 | 803 | 192.168.2.7 | 174.139.6.44 |
Nov 19, 2024 14:15:25.969182014 CET | 49702 | 18530 | 192.168.2.7 | 107.163.56.110 |
Nov 19, 2024 14:15:26.976711035 CET | 49701 | 803 | 192.168.2.7 | 174.139.6.44 |
Nov 19, 2024 14:15:26.976927042 CET | 49702 | 18530 | 192.168.2.7 | 107.163.56.110 |
Nov 19, 2024 14:15:28.976762056 CET | 49701 | 803 | 192.168.2.7 | 174.139.6.44 |
Nov 19, 2024 14:15:28.976844072 CET | 49702 | 18530 | 192.168.2.7 | 107.163.56.110 |
Nov 19, 2024 14:15:32.976731062 CET | 49701 | 803 | 192.168.2.7 | 174.139.6.44 |
Nov 19, 2024 14:15:32.976795912 CET | 49702 | 18530 | 192.168.2.7 | 107.163.56.110 |
Nov 19, 2024 14:15:40.976735115 CET | 49701 | 803 | 192.168.2.7 | 174.139.6.44 |
Nov 19, 2024 14:15:40.976824999 CET | 49702 | 18530 | 192.168.2.7 | 107.163.56.110 |
Nov 19, 2024 14:15:47.994514942 CET | 49710 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:15:49.008049011 CET | 49710 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:15:51.008029938 CET | 49710 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:15:51.015655994 CET | 49711 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:51.016565084 CET | 49712 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:52.008070946 CET | 49712 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:52.023653030 CET | 49711 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:54.008048058 CET | 49712 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:54.023658037 CET | 49711 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:54.683537960 CET | 49713 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:15:55.008105040 CET | 49710 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:15:55.032968044 CET | 49714 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:55.404696941 CET | 49715 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:55.581991911 CET | 49716 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:15:56.039271116 CET | 49714 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:56.414303064 CET | 49715 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:56.586164951 CET | 49716 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:15:58.039310932 CET | 49714 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:58.429919004 CET | 49715 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:58.586230040 CET | 49716 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:15:59.042355061 CET | 49717 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:15:59.157358885 CET | 49719 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:15:59.157592058 CET | 49720 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:00.039288044 CET | 49717 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:00.164335012 CET | 49719 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:00.164355040 CET | 49720 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:02.133084059 CET | 49717 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:02.179982901 CET | 49719 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:02.336194038 CET | 49720 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:03.008105040 CET | 49710 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:03.110068083 CET | 49721 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:03.258155107 CET | 49723 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:03.358597994 CET | 49724 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:04.133162022 CET | 49721 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:04.273722887 CET | 49723 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:04.367456913 CET | 49724 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:06.133085012 CET | 49721 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:06.273768902 CET | 49723 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:06.383131981 CET | 49724 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:07.102595091 CET | 49730 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:07.215215921 CET | 49731 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:07.218239069 CET | 49732 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:08.117464066 CET | 49730 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:08.211256981 CET | 49732 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:08.226841927 CET | 49731 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:09.145294905 CET | 49733 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:10.133111954 CET | 49730 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:10.133110046 CET | 49733 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:10.211252928 CET | 49732 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:10.242486954 CET | 49731 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:11.216938972 CET | 49734 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:11.314013004 CET | 49735 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:11.324549913 CET | 49736 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:12.148925066 CET | 49733 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:12.226866007 CET | 49734 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:12.320612907 CET | 49735 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:12.336213112 CET | 49736 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:14.242480993 CET | 49734 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:14.323225975 CET | 49735 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:14.336210012 CET | 49736 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:15.217668056 CET | 49737 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:15.347918987 CET | 49738 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:15.349728107 CET | 49739 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:16.215356112 CET | 49733 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:16.226849079 CET | 49737 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:16.414339066 CET | 49738 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:16.414340019 CET | 49739 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:18.242537975 CET | 49737 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:18.508137941 CET | 49738 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:18.509224892 CET | 49739 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:19.228382111 CET | 49740 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:19.341869116 CET | 49741 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:19.342580080 CET | 49742 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:20.351897001 CET | 49742 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:20.398864985 CET | 49741 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:20.398885965 CET | 49740 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:22.367520094 CET | 49742 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:22.398752928 CET | 49740 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:22.398897886 CET | 49741 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:23.243558884 CET | 49744 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:23.357207060 CET | 49745 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:23.357634068 CET | 49746 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:24.211360931 CET | 49733 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:24.258100986 CET | 49744 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:24.351857901 CET | 49745 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:24.367505074 CET | 49746 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:26.258138895 CET | 49744 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:26.351895094 CET | 49745 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:26.383184910 CET | 49746 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:27.258985043 CET | 49747 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:27.372498989 CET | 49748 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:27.372843981 CET | 49749 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:28.258151054 CET | 49747 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:28.383174896 CET | 49748 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:28.383291960 CET | 49749 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:30.258200884 CET | 49747 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:30.322020054 CET | 49750 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:30.383160114 CET | 49748 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:30.385229111 CET | 49749 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:31.258882999 CET | 49751 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:31.336324930 CET | 49750 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:31.381665945 CET | 49752 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:31.383624077 CET | 49753 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:32.273811102 CET | 49751 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:32.383204937 CET | 49752 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:32.385230064 CET | 49753 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:33.336302996 CET | 49750 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:34.289419889 CET | 49751 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:34.383210897 CET | 49752 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:34.383210897 CET | 49753 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:35.277220011 CET | 49755 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:35.387283087 CET | 49756 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:35.388334036 CET | 49757 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:36.273857117 CET | 49755 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:36.398802042 CET | 49756 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:36.399250984 CET | 49757 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:37.336349964 CET | 49750 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:38.273777962 CET | 49755 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:38.400945902 CET | 49756 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:38.401220083 CET | 49757 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:39.274810076 CET | 49758 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:39.393409014 CET | 49759 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:39.394593954 CET | 49760 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:40.273822069 CET | 49758 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:40.383203983 CET | 49759 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:40.398803949 CET | 49760 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:42.273825884 CET | 49758 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:42.383193970 CET | 49759 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:42.399281025 CET | 49760 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:43.290503979 CET | 49762 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:43.403106928 CET | 49763 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:43.404423952 CET | 49764 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:44.305049896 CET | 49762 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:44.414460897 CET | 49763 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:44.415229082 CET | 49764 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:45.336319923 CET | 49750 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:46.305093050 CET | 49762 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:46.430093050 CET | 49763 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:46.433228016 CET | 49764 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:47.311919928 CET | 49765 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:47.419796944 CET | 49766 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:47.420892954 CET | 49767 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:48.320710897 CET | 49765 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:48.430053949 CET | 49766 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:48.432255983 CET | 49767 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:50.336322069 CET | 49765 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:50.430130959 CET | 49766 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:50.432528973 CET | 49767 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:51.306488037 CET | 49768 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:51.419017076 CET | 49769 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:51.420368910 CET | 49770 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:51.453625917 CET | 49771 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:52.305115938 CET | 49768 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:52.430090904 CET | 49769 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:52.430090904 CET | 49770 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:52.461335897 CET | 49771 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:54.320770979 CET | 49768 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:54.430102110 CET | 49769 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:54.430102110 CET | 49770 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:54.461425066 CET | 49771 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:55.321887016 CET | 49772 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:55.441435099 CET | 49773 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:55.799202919 CET | 49774 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:56.336333036 CET | 49772 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:56.445744038 CET | 49773 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:56.805191040 CET | 49774 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:57.502216101 CET | 49775 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:57.503593922 CET | 49776 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:57.504211903 CET | 49777 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:58.461383104 CET | 49771 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:16:58.508263111 CET | 49777 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:16:58.508263111 CET | 49776 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:16:58.508290052 CET | 49775 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:00.508305073 CET | 49775 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:00.508327961 CET | 49777 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:00.508362055 CET | 49776 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:01.509066105 CET | 49778 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:01.622514009 CET | 49779 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:01.623567104 CET | 49780 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:02.508234978 CET | 49778 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:02.633225918 CET | 49779 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:02.633251905 CET | 49780 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:04.523968935 CET | 49778 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:04.633322954 CET | 49779 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:04.635370016 CET | 49780 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:05.525218010 CET | 49782 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:05.642155886 CET | 49783 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:05.643446922 CET | 49784 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:06.461383104 CET | 49771 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:06.539469957 CET | 49782 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:06.648870945 CET | 49784 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:06.648871899 CET | 49783 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:08.555146933 CET | 49782 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:08.648902893 CET | 49784 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:08.648909092 CET | 49783 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:09.540383101 CET | 49786 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:09.654217958 CET | 49787 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:09.655111074 CET | 49788 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:10.555123091 CET | 49786 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:10.664592981 CET | 49787 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:10.664593935 CET | 49788 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:12.555126905 CET | 49786 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:12.578476906 CET | 49789 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:12.680113077 CET | 49787 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:12.680170059 CET | 49788 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:13.540435076 CET | 49790 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:13.570775986 CET | 49789 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:13.657846928 CET | 49791 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:13.658763885 CET | 49792 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:14.680155993 CET | 49792 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:14.680157900 CET | 49791 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:14.680166960 CET | 49790 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:15.573442936 CET | 49789 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:16.680160999 CET | 49790 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:16.680301905 CET | 49792 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:16.680424929 CET | 49791 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:17.863663912 CET | 49793 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:17.988631964 CET | 49794 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:18.039454937 CET | 49795 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:18.939928055 CET | 49793 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:19.039531946 CET | 49794 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:19.039531946 CET | 49795 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:19.586390972 CET | 49789 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:20.992650986 CET | 49793 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:21.133296013 CET | 49794 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:21.133405924 CET | 49795 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:21.859607935 CET | 49796 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:21.975028038 CET | 49797 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:21.977174997 CET | 49798 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:22.953454971 CET | 49796 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:22.997248888 CET | 49798 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:23.133389950 CET | 49797 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:24.992670059 CET | 49798 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:25.039592981 CET | 49796 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:25.242681980 CET | 49797 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:26.112729073 CET | 49800 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:26.113234997 CET | 49801 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:26.113771915 CET | 49802 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:27.133280993 CET | 49800 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:27.133337975 CET | 49801 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:27.156802893 CET | 49802 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:27.680174112 CET | 49789 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:29.133358955 CET | 49800 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:29.133477926 CET | 49801 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:29.195808887 CET | 49802 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:30.250857115 CET | 49803 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:30.252608061 CET | 49804 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:30.255140066 CET | 49805 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:31.289576054 CET | 49804 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:31.289613008 CET | 49803 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:31.289772034 CET | 49805 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:33.289580107 CET | 49804 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:33.289628983 CET | 49805 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:33.289737940 CET | 49803 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:33.830959082 CET | 49806 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:34.278074980 CET | 49807 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:34.389992952 CET | 49808 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:34.390203953 CET | 49809 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:34.992691994 CET | 49806 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:35.400424004 CET | 49808 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:35.400490046 CET | 49809 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:35.445812941 CET | 49807 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:37.180212021 CET | 49806 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:37.445929050 CET | 49807 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:37.492712975 CET | 49808 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:37.492712975 CET | 49809 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:38.290735006 CET | 49810 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:38.408442974 CET | 49811 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:38.411551952 CET | 49812 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:39.449084044 CET | 49810 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:39.449269056 CET | 49811 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:39.449278116 CET | 49812 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:41.289585114 CET | 49806 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:41.539618969 CET | 49810 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:41.543308020 CET | 49811 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:41.543431044 CET | 49812 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:42.293278933 CET | 49815 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:42.405395031 CET | 49816 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:42.406645060 CET | 49817 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:43.445847988 CET | 49816 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:43.446382046 CET | 49817 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:43.453305006 CET | 49815 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:45.459029913 CET | 49815 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:45.539634943 CET | 49816 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:45.543498993 CET | 49817 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:46.469209909 CET | 49820 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:46.470593929 CET | 49821 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:46.472385883 CET | 49822 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:47.492729902 CET | 49820 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:47.495062113 CET | 49821 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:47.633727074 CET | 49822 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:49.383380890 CET | 49806 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:49.492743015 CET | 49820 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:49.492765903 CET | 49821 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:49.742875099 CET | 49822 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:50.616060019 CET | 49823 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:50.616261005 CET | 49824 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:50.618333101 CET | 49825 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:51.633356094 CET | 49823 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:51.680252075 CET | 49824 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:51.680345058 CET | 49825 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:53.633372068 CET | 49823 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:53.790070057 CET | 49824 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:53.790070057 CET | 49825 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:54.618798971 CET | 49826 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:54.776606083 CET | 49828 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:54.776616096 CET | 49827 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:55.588099003 CET | 49829 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:55.742784977 CET | 49826 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:55.945934057 CET | 49827 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:55.945935011 CET | 49828 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:56.695947886 CET | 49829 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:57.742788076 CET | 49826 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:57.945914030 CET | 49827 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:57.947057962 CET | 49828 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:58.695930958 CET | 49829 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:17:58.733944893 CET | 49830 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:58.734498024 CET | 49831 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:59.306345940 CET | 49832 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:17:59.789691925 CET | 49830 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:17:59.789789915 CET | 49831 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:00.445918083 CET | 49832 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:18:01.789694071 CET | 49831 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:01.789727926 CET | 49830 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:02.446013927 CET | 49832 | 80 | 192.168.2.7 | 202.108.0.52 |
Nov 19, 2024 14:18:02.745913982 CET | 49833 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:02.789716959 CET | 49829 | 3204 | 192.168.2.7 | 174.139.6.42 |
Nov 19, 2024 14:18:02.874643087 CET | 49834 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:03.742821932 CET | 49833 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:03.992822886 CET | 49834 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:05.742863894 CET | 49833 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:06.008493900 CET | 49834 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:09.742885113 CET | 49833 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:10.024151087 CET | 49834 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:17.742945910 CET | 49833 | 805 | 192.168.2.7 | 174.139.6.43 |
Nov 19, 2024 14:18:18.041418076 CET | 49834 | 805 | 192.168.2.7 | 174.139.6.43 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2024 14:15:54.151190996 CET | 51322 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 19, 2024 14:15:54.642369032 CET | 53 | 51322 | 1.1.1.1 | 192.168.2.7 |
Nov 19, 2024 14:16:55.444747925 CET | 51369 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 19, 2024 14:16:55.798311949 CET | 53 | 51369 | 1.1.1.1 | 192.168.2.7 |
Nov 19, 2024 14:17:58.735167027 CET | 51846 | 53 | 192.168.2.7 | 1.1.1.1 |
Nov 19, 2024 14:17:59.304852962 CET | 53 | 51846 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 19, 2024 14:15:54.151190996 CET | 192.168.2.7 | 1.1.1.1 | 0xd336 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 19, 2024 14:16:55.444747925 CET | 192.168.2.7 | 1.1.1.1 | 0x11cf | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 19, 2024 14:17:58.735167027 CET | 192.168.2.7 | 1.1.1.1 | 0x8e5d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 19, 2024 14:15:54.642369032 CET | 1.1.1.1 | 192.168.2.7 | 0xd336 | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:15:54.642369032 CET | 1.1.1.1 | 192.168.2.7 | 0xd336 | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false | ||
Nov 19, 2024 14:16:55.798311949 CET | 1.1.1.1 | 192.168.2.7 | 0x11cf | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:16:55.798311949 CET | 1.1.1.1 | 192.168.2.7 | 0x11cf | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false | ||
Nov 19, 2024 14:17:59.304852962 CET | 1.1.1.1 | 192.168.2.7 | 0x8e5d | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:17:59.304852962 CET | 1.1.1.1 | 192.168.2.7 | 0x8e5d | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 08:15:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 08:15:24 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 08:15:27 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 08:15:28 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 16 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 20 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 21 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 22 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 23 |
Start time: | 08:15:30 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 25 |
Start time: | 08:15:56 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 26 |
Start time: | 08:15:56 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 27 |
Start time: | 08:15:56 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 28 |
Start time: | 08:15:57 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 29 |
Start time: | 08:16:04 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x330000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 30 |
Start time: | 08:16:05 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x410000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 31 |
Start time: | 08:16:05 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 32 |
Start time: | 08:16:06 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 3.9% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0.9% |
Total number of Nodes: | 215 |
Total number of Limit Nodes: | 11 |
Graph
Function 10008B7A Relevance: 5.1, Strings: 4, Instructions: 84COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003FB7 Relevance: 1.5, APIs: 1, Instructions: 4processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100042A2 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008AAD Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006EDE Relevance: 19.4, APIs: 5, Strings: 6, Instructions: 174sleepfileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10005DB4 Relevance: 14.1, APIs: 1, Strings: 7, Instructions: 116timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006CF7 Relevance: 14.1, APIs: 2, Strings: 6, Instructions: 72timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10007FB7 Relevance: 12.2, APIs: 1, Strings: 7, Instructions: 186sleepCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100082A2 Relevance: 12.1, APIs: 2, Strings: 6, Instructions: 127sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100064D5 Relevance: 10.8, APIs: 3, Strings: 3, Instructions: 276timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008567 Relevance: 9.1, APIs: 3, Strings: 3, Instructions: 83sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006A6E Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 64sleepthreadCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006499 Relevance: 7.2, APIs: 2, Strings: 2, Instructions: 157timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006363 Relevance: 6.1, APIs: 4, Instructions: 115stringCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000841C Relevance: 4.6, APIs: 1, Strings: 2, Instructions: 117sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10007101 Relevance: 4.6, APIs: 2, Strings: 1, Instructions: 95sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100081F7 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 48sleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1002FC2C Relevance: 1.5, APIs: 1, Instructions: 25threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1002B150 Relevance: 1.5, APIs: 1, Instructions: 14threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F0A Relevance: 1.5, APIs: 1, Instructions: 10networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003FF7 Relevance: 1.5, APIs: 1, Instructions: 5COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004104 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004115 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F72 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000400A Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004092 Relevance: 1.5, APIs: 1, Instructions: 3registryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000B224 Relevance: 1.6, Strings: 1, Instructions: 400COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000AEC0 Relevance: 1.5, Strings: 1, Instructions: 266COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F63 Relevance: 1.5, APIs: 1, Instructions: 4shutdownCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1003D000 Relevance: 1.4, Strings: 1, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1003CFE9 Relevance: 1.3, Strings: 1, Instructions: 97COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000B70D Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100053B7 Relevance: 28.2, APIs: 12, Strings: 4, Instructions: 230sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000570F Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 103filethreadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000CCF2 Relevance: .0, Instructions: 2COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100053B7 Relevance: 28.2, APIs: 12, Strings: 4, Instructions: 230sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006EDE Relevance: 19.4, APIs: 5, Strings: 6, Instructions: 174sleepfileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000570F Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 103filethreadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10005DB4 Relevance: 14.1, APIs: 1, Strings: 7, Instructions: 116timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100082A2 Relevance: 12.1, APIs: 2, Strings: 6, Instructions: 127sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10007FB7 Relevance: 10.7, APIs: 1, Strings: 6, Instructions: 186sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006CF7 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 72timeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008567 Relevance: 9.1, APIs: 3, Strings: 3, Instructions: 83sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006363 Relevance: 6.1, APIs: 4, Instructions: 115stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006A6E Relevance: 6.0, APIs: 2, Strings: 2, Instructions: 47sleepthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100053B7 Relevance: 28.2, APIs: 12, Strings: 4, Instructions: 230sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006EDE Relevance: 19.4, APIs: 5, Strings: 6, Instructions: 174sleepfileCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000570F Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 103filethreadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10005DB4 Relevance: 14.1, APIs: 1, Strings: 7, Instructions: 116timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100082A2 Relevance: 12.1, APIs: 2, Strings: 6, Instructions: 127sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10007FB7 Relevance: 10.7, APIs: 1, Strings: 6, Instructions: 186sleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006CF7 Relevance: 10.6, APIs: 2, Strings: 4, Instructions: 72timeCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008567 Relevance: 9.1, APIs: 3, Strings: 3, Instructions: 83sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006363 Relevance: 6.1, APIs: 4, Instructions: 115stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006A6E Relevance: 6.0, APIs: 2, Strings: 2, Instructions: 47sleepthreadCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|