Windows
Analysis Report
b3sV534MMf.dll
Overview
General Information
Sample name: | b3sV534MMf.dllrenamed because original name is a hash value |
Original sample name: | 4135a80b786a0e4504e17352362e6ecc754b4ce5.dll |
Analysis ID: | 1558490 |
MD5: | 28de8c856e847f8097131e502fc75d8d |
SHA1: | 4135a80b786a0e4504e17352362e6ecc754b4ce5 |
SHA256: | 657ffa1f45c97cdda48a5c2ea95eecdfdfeae68d9aac937c120b0ab063ea6e87 |
Tags: | dlluser-NDA0E |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- loaddll32.exe (PID: 1312 cmdline:
loaddll32. exe "C:\Us ers\user\D esktop\b3s V534MMf.dl l" MD5: 51E6071F9CBA48E79F10C84515AAE618) - conhost.exe (PID: 3196 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 5764 cmdline:
cmd.exe /C rundll32. exe "C:\Us ers\user\D esktop\b3s V534MMf.dl l",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - rundll32.exe (PID: 1308 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\b3sV 534MMf.dll ",#1 MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 6780 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 6724 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12) - rundll32.exe (PID: 2896 cmdline:
rundll32.e xe C:\User s\user\Des ktop\b3sV5 34MMf.dll, GetColor MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 7180 cmdline:
rundll32.e xe C:\User s\user\Des ktop\b3sV5 34MMf.dll, InputFile MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 7204 cmdline:
rundll32.e xe C:\User s\user\Des ktop\b3sV5 34MMf.dll, PrintFile MD5: 889B99C52A60DD49227C5E485A016679) - WerFault.exe (PID: 7280 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 204 -s 672 MD5: C31336C1EFC2CCB44B4326EA793040F2) - rundll32.exe (PID: 7348 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\b3sV 534MMf.dll ",GetColor MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7400 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7428 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 7488 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12) - rundll32.exe (PID: 7356 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\b3sV 534MMf.dll ",InputFil e MD5: 889B99C52A60DD49227C5E485A016679) - rundll32.exe (PID: 7384 cmdline:
rundll32.e xe "C:\Use rs\user\De sktop\b3sV 534MMf.dll ",PrintFil e MD5: 889B99C52A60DD49227C5E485A016679) - WerFault.exe (PID: 7464 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 7 384 -s 668 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- rundll32.exe (PID: 7812 cmdline:
"C:\Window s\SysWOW64 \rundll32. exe" "C:\U sers\user\ Desktop\b3 sV534MMf.d ll",GetCol or MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7832 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7844 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 7884 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
- rundll32.exe (PID: 7948 cmdline:
"C:\Window s\SysWOW64 \rundll32. exe" "C:\U sers\user\ Desktop\b3 sV534MMf.d ll",GetCol or MD5: 889B99C52A60DD49227C5E485A016679) - cmd.exe (PID: 7976 cmdline:
cmd.exe /c ping 127. 0.0.1 -n 3 &rd /s /q "C:\Users\ user\Deskt op" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7984 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 8020 cmdline:
ping 127.0 .0.1 -n 3 MD5: B3624DD758CCECF93A1226CEF252CA12)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
| |
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
| |
Winnti_NlaifSvc | Winnti sample - file NlaifSvc.dll | Florian Roth |
|
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Code function: | 3_2_10007F3E |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | TCP traffic: |
Source: | Process created: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: | 3_2_10003F41 |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Process Stats: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 3_2_10008AAD |
Source: | Code function: | 3_2_10003F63 |
Source: | Code function: | 3_2_1000B224 | |
Source: | Code function: | 3_2_1000B70D | |
Source: | Code function: | 3_2_100121ED | |
Source: | Code function: | 3_2_1000AEC0 |
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_1000404F |
Source: | Code function: | 3_2_10003FB7 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: |
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | Code function: | 3_2_1002ECC8 | |
Source: | Code function: | 3_2_10028400 | |
Source: | Code function: | 3_2_10028408 | |
Source: | Code function: | 3_2_100475EC | |
Source: | Code function: | 3_2_10034E3B | |
Source: | Code function: | 3_2_10032573 | |
Source: | Code function: | 3_2_10027045 | |
Source: | Code function: | 3_2_1002F03D | |
Source: | Code function: | 3_2_1002C00B | |
Source: | Code function: | 3_2_1002F074 | |
Source: | Code function: | 3_2_10025F46 | |
Source: | Code function: | 3_2_1003507D | |
Source: | Code function: | 3_2_10025F46 | |
Source: | Code function: | 3_2_10025F46 | |
Source: | Code function: | 3_2_1002A6EF | |
Source: | Code function: | 3_2_10033C8A | |
Source: | Code function: | 3_2_10031326 | |
Source: | Code function: | 3_2_10025F46 | |
Source: | Code function: | 3_2_10025F46 | |
Source: | Code function: | 3_2_100230D3 | |
Source: | Code function: | 3_2_100279AB | |
Source: | Code function: | 3_2_10037A41 | |
Source: | Code function: | 3_2_100207C2 | |
Source: | Code function: | 3_2_1002B105 | |
Source: | Code function: | 3_2_100230D3 | |
Source: | Code function: | 3_2_100350E8 | |
Source: | Code function: | 3_2_1001F0F0 | |
Source: | Code function: | 3_2_1002F125 | |
Source: | Code function: | 3_2_10035121 | |
Source: | Code function: | 3_2_10025103 | |
Source: | Code function: | 3_2_1002792A |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | Code function: | 3_2_10008B7A |
Boot Survival |
---|
Source: | Code function: | 3_2_10008B7A |
Source: | Registry value created or modified: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | Evasive API call chain: | graph_3-18871 |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Evasive API call chain: | graph_3-18860 |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 3_2_10007F3E |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior | ||
Source: | Network Connect: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior | ||
Source: | Device IO: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | OS Credential Dumping | 2 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 11 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 3 Obfuscated Files or Information | LSASS Memory | 111 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 Bootkit | 111 Process Injection | 1 Software Packing | Security Account Manager | 21 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 11 Registry Run Keys / Startup Folder | 1 DLL Side-Loading | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 1 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Masquerading | LSA Secrets | 1 Process Discovery | SSH | Keylogging | 1 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 31 Virtualization/Sandbox Evasion | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 Access Token Manipulation | DCSync | 1 Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 111 Process Injection | Proc Filesystem | 1 System Network Configuration Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | 1 Bootkit | /etc/passwd and /etc/shadow | Network Sniffing | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
IP Addresses | Compromise Infrastructure | Supply Chain Compromise | PowerShell | Cron | Cron | 1 Rundll32 | Network Sniffing | Network Service Discovery | Shared Webroot | Local Data Staging | File Transfer Protocols | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | External Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | ReversingLabs | Win32.Backdoor.Zegost | ||
100% | Avira | TR/Farfli.ghwpt | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
blogx.sina.com.cn | 202.108.0.52 | true | false | high | |
blog.sina.com.cn | unknown | unknown | false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
202.108.0.52 | blogx.sina.com.cn | China | 4808 | CHINA169-BJChinaUnicomBeijingProvinceNetworkCN | false | |
107.163.56.110 | unknown | United States | 20248 | TAKE2US | true | |
174.139.6.44 | unknown | United States | 35908 | VPLSNETUS | true | |
174.139.6.43 | unknown | United States | 35908 | VPLSNETUS | true | |
174.139.6.42 | unknown | United States | 35908 | VPLSNETUS | true |
IP |
---|
127.0.0.1 |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1558490 |
Start date and time: | 2024-11-19 14:20:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 23s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 33 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | b3sV534MMf.dllrenamed because original name is a hash value |
Original Sample Name: | 4135a80b786a0e4504e17352362e6ecc754b4ce5.dll |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winDLL@42/10@3/6 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 52.182.143.212, 20.42.73.29, 20.189.173.8
- Excluded domains from analysis (whitelisted): self-events-data.trafficmanager.net, onedscolprdwus07.westus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, self.events.data.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtDeviceIoControlFile calls found.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: b3sV534MMf.dll
Time | Type | Description |
---|---|---|
08:21:16 | API Interceptor | |
08:21:23 | API Interceptor | |
08:23:31 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
202.108.0.52 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
107.163.56.110 | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
174.139.6.44 | Get hash | malicious | Unknown | Browse | ||
174.139.6.43 | Get hash | malicious | Unknown | Browse | ||
174.139.6.42 | Get hash | malicious | Unknown | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
blogx.sina.com.cn | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CHINA169-BJChinaUnicomBeijingProvinceNetworkCN | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
VPLSNETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
VPLSNETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TAKE2US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Windows\SysWOW64\rundll32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 545 |
Entropy (8bit): | 4.294829216447718 |
Encrypted: | false |
SSDEEP: | 12:8E2V6mEWfe1Vmb3xyE+QGJ03P2nIupppppppppA:8E2V6mEWm1V83AE+QGJ03P2nIupppppA |
MD5: | 20D452BA42B131C7715F2B70226BD18F |
SHA1: | 880D3D514C5B01C14952B5BE7E1204E3AFEFCB0B |
SHA-256: | 0817036301F37A595D703849942A72F38B1DFDF2AB58C27951D13E90AAB6116B |
SHA-512: | 68F97AF0DC1846F9C55DC2541E95C04613AF9D118397C8169B10D77FE7C3F8BC726B0852AB6D9C36BE1A76F731F34631C616D292FC1B6355C606761199FA1037 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d2d6a05f617930bde2d4c76b2a5555e299272ba9_7522e4b5_d72391a1-0057-4f8a-aec9-13bcc5ddd162\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9501327138575276 |
Encrypted: | false |
SSDEEP: | 192:qqihipwOg30BU/wjeTlW6ZYzuiFxZ24IO8dci:KhivgEBU/wjex7YzuiFxY4IO8dci |
MD5: | 270264767AA2E2A110A04B8DB4105F77 |
SHA1: | A4347646CCC49A3F98B12CC0CEC5E8A4C041A8FA |
SHA-256: | 7D89EA7B90743162C65B895E245ABBD37C84A944CBF1627991C580FA82BE5ABE |
SHA-512: | D7ADC8F077853ECD7810DC93BC0A2A83447693216BAD8194EB7D6161E26D1F2C3C703A30FC5367E6BC294FC4F9517CC52F8135B43F5607C4714A29D64A9CD2EF |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_rundll32.exe_d2d6a05f617930bde2d4c76b2a5555e299272ba9_7522e4b5_fa7a985e-ae7d-4121-8b55-6115f8b96465\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.9500609877784236 |
Encrypted: | false |
SSDEEP: | 192:9pi8Or30BU/wjeTlWaZYzuiFWZ24IO8dci:ziNrEBU/wjexbYzuiFWY4IO8dci |
MD5: | 4C6B04F06633C067D289B35100D8BAAA |
SHA1: | 5BFFEF7DBF944566970BC9888EC8B87701DF9236 |
SHA-256: | A004B5E42082476FCA7A3424EC2BCB9B70921FC157C35DCEB79012B2B904DECE |
SHA-512: | 4760B70054FABDA11384CA3335FBB49C7BF718EA41903E658713A949854676D73F8C82FFEBDD847BF6A1B91A370346CCF4944B4C20FE835A03321700248DBA53 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46060 |
Entropy (8bit): | 1.972564757559395 |
Encrypted: | false |
SSDEEP: | 192:RvQFZwnXUXa+CO5H4z1LlRh5/pd7QozDDGEloY06:hSZwjK5Hy1Lld/pd7HDGEO6 |
MD5: | BAF4466F6321998663186A6524FF760E |
SHA1: | 5218022972D2E854DAADBF9E050A85784014EF79 |
SHA-256: | 2F8FCDF10020075E8EF5A576CBA87416357C442ECF5DEBE62F5D16487446C72A |
SHA-512: | 52B11BB92A5E8F0BB56BAF2AE4FA9052385CDFC2EA4F004ADCBC28300495386577E11133A219C8E0C1D88679BEB6F07EF4C27A5F1532EF94D4ABCE731A492B0A |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8274 |
Entropy (8bit): | 3.6942061461833755 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJnMP6qo6Yr160gmfTZhprQ89bXFsf0j9m:R6lXJE6N6Yp60gmfTZxXefP |
MD5: | A51F03B049C5228ED22954FABE755CD6 |
SHA1: | B651CE1129CE37FFB8916C9BC069C267E225B6B5 |
SHA-256: | 8B4084F30E8FF212B0BC7E54F9B1B90CE9F3AC5BDAF516E7234B1E5D230A34E8 |
SHA-512: | 914B99E53C3C9B0D4630EB8C7151A0D80394F4956FFED291E34BABB378C090A1BCB947743B8774DEDA21A1FBC087C6D8E7116C4A9428E5267672E436E95D308D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4654 |
Entropy (8bit): | 4.463009927202668 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsHJg77aI9WZWpW8VYWYm8M4JCdPSF++q8/A26A1GScSxd:uIjfpI7Yo7VCJGrA1J3xd |
MD5: | 7B505C43385EE48EC5109B1B7C19F506 |
SHA1: | C9CF2FC9CA77A1808619B767C8C70E1056674583 |
SHA-256: | 07FB9834707E47BCA6595CB42E570BE96AFC22DAC71DDD69AD2C3755C1D50284 |
SHA-512: | FD068BEEC2A2E8648D7FDF16BE4404BDD837808AFA1964E7E6C4D4E5EED4A5BAA3DFAF79852C495DE0923A00F0B66C820382C5AAC4C7262A3D7BDD42FA9E0199 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 44538 |
Entropy (8bit): | 2.0069766522026904 |
Encrypted: | false |
SSDEEP: | 192:iNAdFZwsMXUXablvO5H4TX9U6Mi/lIPeIY0c7g6hE6bG3:mATZwsKblm5HSX9ZMi/lI23nm |
MD5: | 28D25DE9B860D1C0B14D7BE24676F397 |
SHA1: | C3390136674262255AB8675BBD443AF056D1298C |
SHA-256: | 666A80C3A06C622E44E0865213724341CAAF20E96DFDE2E25490CE8493D688CB |
SHA-512: | 6F6940BF04974A76F6FDFA15E155FC9BAE003F2ECA23D59410AA4B4FDED0B3CE0FE8D6E3CACB2192AC0A5368E16D1EAD959BE4B5E9F9CFC922FEF94C928C5039 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8270 |
Entropy (8bit): | 3.6953182307591685 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJd5666YTQ76j4gmfTZhprG89b4nsf3Im:R6lXJz666YM76j4gmfTZD4sfd |
MD5: | E2231A98F039DEF343653301B29AE908 |
SHA1: | EB41FBCA7920926A1C59585AC23995A48FB11764 |
SHA-256: | 83DB1AF00DBD0A6113C74CF8A56F9C39844D475D8AB7E6CB43ED14D20CD6B2B5 |
SHA-512: | 92CA76D51DBAF91039A659E98D6ECFCB653D925D13CF7D5E0B3747DEC18B9A91F40668DE771EDA25AB4A2927CABDE529B5695E0690AD924068C2C26F3BE1EDDE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4654 |
Entropy (8bit): | 4.464471239442059 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsHJg77aI9WZWpW8VY6sYm8M4JCdPSFJ+q8/A0hGScS4d:uIjfpI7Yo7VrpJB8hJ34d |
MD5: | 4C752F3B6A4BBBDC90A4AA237199D9B2 |
SHA1: | 4E9359D43A86AE1E7128532FDA0CC80BE431B96B |
SHA-256: | 14249EB5D5AE63A8C60287500F3A0B900F81799003DB7FBC696B777A7D86144C |
SHA-512: | 55C5DA7F9B23FA75D15ADF754B965342686B7C3B1B05CC63D17CE96B972D066F8E0BCEEE5B4266CE67BF5746298C019D2ED1D5C6327E596315F4899A4CC6DA94 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4662622230137305 |
Encrypted: | false |
SSDEEP: | 6144:3IXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbG:4XD94+WlLZMM6YFHT+G |
MD5: | 42761F45B343B66D08FE691F149A7CA3 |
SHA1: | 84D545EDD2106185D343ED31CA85FABAC0AFBAA5 |
SHA-256: | 8B7A626F126DD8293BAF806E2D72F2E900F907931B9C6C5C44D94FD9316E7486 |
SHA-512: | 38194F46F7AAAA689537D04C5A782134163AB9A06EA51BF1C3D0CBC583DFFCB85A05A3926FE9E35CEB84F2D872BD9BDF3B0513E657E819089A634A93E8E55771 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.5937427390560135 |
TrID: |
|
File name: | b3sV534MMf.dll |
File size: | 307'834 bytes |
MD5: | 28de8c856e847f8097131e502fc75d8d |
SHA1: | 4135a80b786a0e4504e17352362e6ecc754b4ce5 |
SHA256: | 657ffa1f45c97cdda48a5c2ea95eecdfdfeae68d9aac937c120b0ab063ea6e87 |
SHA512: | 2a3bafdcd8efeb511d4889f943648175513710f495af6408392752623d662ba98052e9b03a5fa70a6d5f36ddc0f4e7bf108721cc31171a722d4b3fa796171044 |
SSDEEP: | 6144:NuezXQ8wsFPhmNsCBk5mizL5rC5rgRMLt6wVVNrBqFdEJRKgY:LzA8wsFPEsC+5dzL5rC5rgRML4wVVN8H |
TLSH: | D9649E51337252F5D4DB0A32AE29EB2EE77064109CECDD52DF8315852CE344AFA9938B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......... B..N...N...N...B...N.F.....N.......N.......N.......N...@...N.m.D...N...O.^.N.m.E...N.=.H...N.m.J...N.Rich..N................ |
Icon Hash: | 7ae282899bbab082 |
Entrypoint: | 0x1003c7e7 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x10000000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED, DLL |
DLL Characteristics: | |
Time Stamp: | 0x565E7E2A [Wed Dec 2 05:14:18 2015 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | e68f6ce4fad6e16f1060136013578ef2 |
Instruction |
---|
call 00007FE6305481D0h |
pushfd |
mov byte ptr [edi-01h], 00000000h |
lahf |
jmp 00007FE63054F146h |
lea esp, dword ptr [esp+2Ch] |
ja 00007FE63054AA2Ah |
clc |
push esi |
clc |
cmc |
imul edx, edx, 0000000Ah |
bt cx, 0006h |
call 00007FE63054EAB9h |
scasb |
cli |
jns 00007FE630549376h |
xchg eax, ebp |
or al, A3h |
outsd |
sub eax, 2E68A76Ah |
popad |
cmp esi, edi |
stosb |
arpl word ptr [edx+edx], sp |
cwde |
add byte ptr [ebx], dh |
mov ecx, F931ECB0h |
fcomp3 st(7) |
neg dword ptr [esi] |
push esp |
dec byte ptr [edi] |
outsd |
fild qword ptr [edi+7369282Eh] |
adc dword ptr [ebx-17h], edx |
xor dword ptr [esi], ebx |
dec eax |
imul dword ptr [edi+09B273BCh] |
retf 1D1Bh |
dec edi |
sbb dword ptr [edx-3751134Ch], esi |
mov ebx, 49984820h |
in eax, dx |
movsd |
fdecstp |
mov cl, 56h |
xlatb |
push ss |
iretd |
or byte ptr [ebx+62h], cl |
dec edx |
movsd |
cmpsd |
jbe 00007FE6305493F2h |
std |
jno 00007FE630549337h |
xor eax, 5EF4DB8Ah |
les esi, fword ptr [ebp-19CAF247h] |
clc |
sub ebp, edx |
inc ecx |
mov ebx, 26422BC8h |
push esi |
and eax, A755A9C5h |
fsubr dword ptr [ebp+47322F99h] |
xchg eax, esp |
mov dl, 5Dh |
enter 4489h, 24h |
and al, C6h |
inc esp |
and al, 08h |
inc esp |
mov byte ptr [esp], cl |
pushfd |
push dword ptr [esp] |
push dword ptr [esp+2Ch] |
retn 0030h |
adc dword ptr [ebx+00h], eax |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x4b4fc | 0x63 | .rsrc |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3ba60 | 0x118 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x4b000 | 0x4e8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x48000 | 0x16a0 | .text |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x4a000 | 0x49600 | a96619345afc837efb52794823a02534 | False | 0.624823653109029 | data | 6.591507115633169 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x4b000 | 0x2000 | 0x1800 | 1bf51ba21035870b8724a79f96a556c7 | False | 0.794921875 | data | 6.804416992654808 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x4d000 | 0x1000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_DIALOG | 0x4a000 | 0xb2 | data | English | United States | 0.7191011235955056 |
RT_DIALOG | 0x4a0b8 | 0xb2 | data | English | United States | 0.7191011235955056 |
RT_STRING | 0x4a170 | 0x2a2 | data | English | United States | 0.37388724035608306 |
RT_VERSION | 0x4b118 | 0x3d0 | data | English | United States | 0.4764344262295082 |
DLL | Import |
---|---|
MFC42.DLL | |
MSVCRT.dll | memcpy |
KERNEL32.dll | SetFilePointer |
USER32.dll | wsprintfA |
ADVAPI32.dll | AdjustTokenPrivileges |
WS2_32.dll | htons |
SHLWAPI.dll | StrStrIA |
ole32.dll | CoInitializeSecurity |
OLEAUT32.dll | SysFreeString |
MSVCP60.dll | ?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z |
NETAPI32.dll | Netbios |
KERNEL32.dll | GetModuleFileNameW |
KERNEL32.dll | GetModuleHandleA, LoadLibraryA, LocalAlloc, LocalFree, GetModuleFileNameA, ExitProcess |
Name | Ordinal | Address |
---|---|---|
GetColor | 1 | 0x10008645 |
InputFile | 2 | 0x1000678b |
PrintFile | 3 | 0x1000443d |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2024 14:21:18.043709993 CET | 49738 | 803 | 192.168.2.4 | 174.139.6.44 |
Nov 19, 2024 14:21:18.109107018 CET | 49739 | 18530 | 192.168.2.4 | 107.163.56.110 |
Nov 19, 2024 14:21:19.047017097 CET | 49738 | 803 | 192.168.2.4 | 174.139.6.44 |
Nov 19, 2024 14:21:19.109510899 CET | 49739 | 18530 | 192.168.2.4 | 107.163.56.110 |
Nov 19, 2024 14:21:21.047030926 CET | 49738 | 803 | 192.168.2.4 | 174.139.6.44 |
Nov 19, 2024 14:21:21.109527111 CET | 49739 | 18530 | 192.168.2.4 | 107.163.56.110 |
Nov 19, 2024 14:21:25.062658072 CET | 49738 | 803 | 192.168.2.4 | 174.139.6.44 |
Nov 19, 2024 14:21:25.132925987 CET | 49739 | 18530 | 192.168.2.4 | 107.163.56.110 |
Nov 19, 2024 14:21:33.062710047 CET | 49738 | 803 | 192.168.2.4 | 174.139.6.44 |
Nov 19, 2024 14:21:33.140842915 CET | 49739 | 18530 | 192.168.2.4 | 107.163.56.110 |
Nov 19, 2024 14:21:40.082081079 CET | 49743 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:21:41.078468084 CET | 49743 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:21:43.078372955 CET | 49743 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:21:43.252254963 CET | 49744 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:43.252532005 CET | 49745 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:44.265870094 CET | 49745 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:44.265872002 CET | 49744 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:46.265880108 CET | 49745 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:46.265881062 CET | 49744 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:46.652245998 CET | 49746 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:47.078577995 CET | 49743 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:21:47.253612995 CET | 49747 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:47.364893913 CET | 49748 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:47.365425110 CET | 49749 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:48.265891075 CET | 49747 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:48.359642029 CET | 49749 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:48.375253916 CET | 49748 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:50.266021013 CET | 49747 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:50.359643936 CET | 49749 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:50.390896082 CET | 49748 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:51.258402109 CET | 49750 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:51.535480022 CET | 49751 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:51.536098957 CET | 49752 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:52.265901089 CET | 49750 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:52.547167063 CET | 49751 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:52.547367096 CET | 49752 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:54.265938997 CET | 49750 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:54.607287884 CET | 49751 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:54.607790947 CET | 49752 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:55.078434944 CET | 49743 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:21:55.267950058 CET | 49754 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:55.382906914 CET | 49755 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:55.383697033 CET | 49756 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:56.312813997 CET | 49754 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:56.390953064 CET | 49755 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:56.390964031 CET | 49756 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:58.406589031 CET | 49754 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:58.406588078 CET | 49755 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:58.406662941 CET | 49756 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:21:59.532591105 CET | 49758 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:59.649398088 CET | 49759 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:21:59.653146029 CET | 49760 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:00.547288895 CET | 49758 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:00.656625986 CET | 49760 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:00.703474998 CET | 49759 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:01.190318108 CET | 49761 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:02.203469992 CET | 49761 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:02.547250032 CET | 49758 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:02.656621933 CET | 49760 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:02.703485012 CET | 49759 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:03.673880100 CET | 49762 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:03.674550056 CET | 49763 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:03.676060915 CET | 49764 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:04.219088078 CET | 49761 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:04.694473982 CET | 49762 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:04.812853098 CET | 49763 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:04.812983990 CET | 49764 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:06.704320908 CET | 49762 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:06.812856913 CET | 49763 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:06.813098907 CET | 49764 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:07.673007965 CET | 49765 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:07.787035942 CET | 49767 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:07.789345980 CET | 49768 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:08.234750986 CET | 49761 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:08.672230005 CET | 49765 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:08.797277927 CET | 49767 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:08.797281981 CET | 49768 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:10.687927961 CET | 49765 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:10.797385931 CET | 49767 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:10.797610044 CET | 49768 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:11.691502094 CET | 49769 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:11.803848982 CET | 49770 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:11.804934025 CET | 49771 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:12.687882900 CET | 49769 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:12.812922001 CET | 49770 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:12.812922001 CET | 49771 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:14.687899113 CET | 49769 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:14.812908888 CET | 49770 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:14.812908888 CET | 49771 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:15.689158916 CET | 49773 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:15.823456049 CET | 49774 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:15.824022055 CET | 49775 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:16.234893084 CET | 49761 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:16.703532934 CET | 49773 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:16.828531981 CET | 49774 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:16.828658104 CET | 49775 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:18.719187975 CET | 49773 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:18.844171047 CET | 49774 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:18.844422102 CET | 49775 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:19.755863905 CET | 49776 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:19.869724035 CET | 49777 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:19.869975090 CET | 49778 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:20.766108036 CET | 49776 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:20.875413895 CET | 49778 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:20.875413895 CET | 49777 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:22.347388029 CET | 49779 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:22.766118050 CET | 49776 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:22.891022921 CET | 49778 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:22.891022921 CET | 49777 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:23.359796047 CET | 49779 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:23.788973093 CET | 49780 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:23.896883965 CET | 49781 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:23.897645950 CET | 49782 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:24.781688929 CET | 49780 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:24.906667948 CET | 49781 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:24.906667948 CET | 49782 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:25.375446081 CET | 49779 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:26.781694889 CET | 49780 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:26.908896923 CET | 49781 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:26.922377110 CET | 49782 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:27.782551050 CET | 49789 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:27.899569035 CET | 49790 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:27.901606083 CET | 49791 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:28.797382116 CET | 49789 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:28.891063929 CET | 49790 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:28.891149044 CET | 49791 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:29.375475883 CET | 49779 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:30.812959909 CET | 49789 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:30.906727076 CET | 49790 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:30.906770945 CET | 49791 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:31.798799038 CET | 49793 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:31.933974981 CET | 49794 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:31.936225891 CET | 49795 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:32.797346115 CET | 49793 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:32.937966108 CET | 49794 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:32.938004017 CET | 49795 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:34.797346115 CET | 49793 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:34.937966108 CET | 49794 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:34.938014984 CET | 49795 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:35.814255953 CET | 49796 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:35.933948040 CET | 49797 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:35.939815044 CET | 49798 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:36.828588009 CET | 49796 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:36.922354937 CET | 49797 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:36.937979937 CET | 49798 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:37.391107082 CET | 49779 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:38.828592062 CET | 49796 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:38.923222065 CET | 49797 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:38.937994003 CET | 49798 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:39.830739975 CET | 49800 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:39.943835974 CET | 49801 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:39.945286989 CET | 49802 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:40.844254017 CET | 49800 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:40.953623056 CET | 49802 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:40.953670025 CET | 49801 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:42.859869003 CET | 49800 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:42.953681946 CET | 49801 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:42.969317913 CET | 49802 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:43.518017054 CET | 49803 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:43.860842943 CET | 49804 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:44.346401930 CET | 49805 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:44.348786116 CET | 49806 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:44.531785011 CET | 49803 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:44.875524044 CET | 49804 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:45.359916925 CET | 49805 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:45.359961033 CET | 49806 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:46.547421932 CET | 49803 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:46.875504971 CET | 49804 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:47.359935045 CET | 49806 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:47.359935045 CET | 49805 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:47.861368895 CET | 49812 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:47.986105919 CET | 49813 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:48.312623978 CET | 49814 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:48.875562906 CET | 49812 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:49.000534058 CET | 49813 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:49.313018084 CET | 49814 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:50.563422918 CET | 49803 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:50.875546932 CET | 49812 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:51.016174078 CET | 49813 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:51.313059092 CET | 49814 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:51.877054930 CET | 49815 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:51.994679928 CET | 49816 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:52.012778044 CET | 49817 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:52.891268969 CET | 49815 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:52.984940052 CET | 49816 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:53.016176939 CET | 49817 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:54.906857967 CET | 49815 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:54.984945059 CET | 49816 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:55.031802893 CET | 49817 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:55.892921925 CET | 49818 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:56.006154060 CET | 49819 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:56.007213116 CET | 49820 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:56.906794071 CET | 49818 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:57.016304016 CET | 49819 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:57.016432047 CET | 49820 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:58.578743935 CET | 49803 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:22:58.906861067 CET | 49818 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:59.016277075 CET | 49820 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:22:59.016486883 CET | 49819 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:22:59.910170078 CET | 49823 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:00.020482063 CET | 49824 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:00.021430016 CET | 49825 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:00.922462940 CET | 49823 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:01.031882048 CET | 49825 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:01.034564972 CET | 49824 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:02.938076973 CET | 49823 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:03.047446966 CET | 49825 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:03.047549963 CET | 49824 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:03.909010887 CET | 49828 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:04.055325031 CET | 49829 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:04.056952953 CET | 49830 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:04.689764023 CET | 49831 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:04.922575951 CET | 49828 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:05.047468901 CET | 49829 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:05.063086987 CET | 49830 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:05.813116074 CET | 49831 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:06.922611952 CET | 49828 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:07.110605001 CET | 49830 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:07.235358000 CET | 49829 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:07.813091040 CET | 49831 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:08.055629969 CET | 49832 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:08.056571007 CET | 49833 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:08.056895971 CET | 49834 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:09.219501019 CET | 49834 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:09.219608068 CET | 49832 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:09.219669104 CET | 49833 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:10.679543972 CET | 49835 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:10.679543972 CET | 49836 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:10.680649996 CET | 49837 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:11.735001087 CET | 49835 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:11.735019922 CET | 49836 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:11.735019922 CET | 49837 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:11.895657063 CET | 49831 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:13.734982014 CET | 49835 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:13.734997034 CET | 49836 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:13.734997988 CET | 49837 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:14.811294079 CET | 49838 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:14.811691999 CET | 49839 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:14.812732935 CET | 49840 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:15.828783035 CET | 49838 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:15.828778028 CET | 49840 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:15.906874895 CET | 49839 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:17.909171104 CET | 49839 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:17.922538042 CET | 49840 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:17.922542095 CET | 49838 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:18.879826069 CET | 49841 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:19.144808054 CET | 49843 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:19.324598074 CET | 49844 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:19.906924009 CET | 49831 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:20.031896114 CET | 49841 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:20.219415903 CET | 49843 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:20.406887054 CET | 49844 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:22.032097101 CET | 49841 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:22.313294888 CET | 49843 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:22.516294003 CET | 49844 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:22.907874107 CET | 49845 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:22.992968082 CET | 49846 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:23.024702072 CET | 49847 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:24.018640995 CET | 49845 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:24.031920910 CET | 49846 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:24.031920910 CET | 49847 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:26.016294003 CET | 49845 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:26.018054962 CET | 49848 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:26.031910896 CET | 49846 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:26.032002926 CET | 49847 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:26.924649000 CET | 49849 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:27.048959017 CET | 49850 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:27.053303957 CET | 49851 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:27.100670099 CET | 49848 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:28.031930923 CET | 49849 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:28.235040903 CET | 49850 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:28.235166073 CET | 49851 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:29.219448090 CET | 49848 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:30.032660961 CET | 49849 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:30.235071898 CET | 49850 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:30.235071898 CET | 49851 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:30.927350998 CET | 49852 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:31.041491985 CET | 49853 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:31.043530941 CET | 49854 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:32.031994104 CET | 49852 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:32.219455004 CET | 49853 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:32.219455004 CET | 49854 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:33.219695091 CET | 49848 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:34.034806013 CET | 49852 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:34.219439983 CET | 49853 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:34.238692045 CET | 49854 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:34.933223009 CET | 49857 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:35.061311007 CET | 49858 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:35.061567068 CET | 49859 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:36.016367912 CET | 49857 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:36.235090971 CET | 49858 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:36.235090971 CET | 49859 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:38.016365051 CET | 49857 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:38.328840971 CET | 49858 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:38.328970909 CET | 49859 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:39.108556986 CET | 49860 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:39.111231089 CET | 49861 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:39.112771034 CET | 49862 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:40.219491959 CET | 49860 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:40.219491959 CET | 49861 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:40.235111952 CET | 49862 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:41.219506979 CET | 49848 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:42.219486952 CET | 49860 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:42.219486952 CET | 49861 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:42.328857899 CET | 49862 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:43.133724928 CET | 49864 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:43.244712114 CET | 49865 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:43.245973110 CET | 49866 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:44.219487906 CET | 49864 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:44.330220938 CET | 49866 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:44.407018900 CET | 49865 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:46.219691992 CET | 49864 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:46.328850985 CET | 49866 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:46.487813950 CET | 49865 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:47.142712116 CET | 49867 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:47.259228945 CET | 49868 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:47.259228945 CET | 49869 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:47.340723038 CET | 49870 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:48.220505953 CET | 49867 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:48.328883886 CET | 49870 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:48.354809046 CET | 49868 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:48.354866982 CET | 49869 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:50.219502926 CET | 49867 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:50.329339981 CET | 49870 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:50.407031059 CET | 49868 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:50.407114983 CET | 49869 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:51.160871983 CET | 49871 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:51.276133060 CET | 49872 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:51.858613968 CET | 49873 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:52.205133915 CET | 49871 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:52.313324928 CET | 49872 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:53.016411066 CET | 49873 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:54.219526052 CET | 49871 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:54.328885078 CET | 49870 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:23:54.370300055 CET | 49872 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:55.181091070 CET | 49874 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:55.400453091 CET | 49875 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:55.402904987 CET | 49876 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:56.219517946 CET | 49874 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:56.490305901 CET | 49875 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:56.490335941 CET | 49876 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:58.219543934 CET | 49874 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:58.610158920 CET | 49875 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:58.610256910 CET | 49876 | 80 | 192.168.2.4 | 202.108.0.52 |
Nov 19, 2024 14:23:59.192003012 CET | 49877 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:23:59.310776949 CET | 49879 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:00.219593048 CET | 49877 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:00.328912973 CET | 49879 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:02.219551086 CET | 49877 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:02.422688007 CET | 49870 | 3204 | 192.168.2.4 | 174.139.6.42 |
Nov 19, 2024 14:24:02.422699928 CET | 49879 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:03.330281973 CET | 49881 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:03.332714081 CET | 49882 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:04.328973055 CET | 49882 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:04.328963041 CET | 49881 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:06.328938007 CET | 49881 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:06.328944921 CET | 49882 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:10.330240011 CET | 49881 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:10.330290079 CET | 49882 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:18.344631910 CET | 49881 | 805 | 192.168.2.4 | 174.139.6.43 |
Nov 19, 2024 14:24:18.344660997 CET | 49882 | 805 | 192.168.2.4 | 174.139.6.43 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 19, 2024 14:21:46.303427935 CET | 64871 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 19, 2024 14:21:46.649912119 CET | 53 | 64871 | 1.1.1.1 | 192.168.2.4 |
Nov 19, 2024 14:22:47.991146088 CET | 61214 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 19, 2024 14:22:48.311491966 CET | 53 | 61214 | 1.1.1.1 | 192.168.2.4 |
Nov 19, 2024 14:23:51.278502941 CET | 64785 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 19, 2024 14:23:51.823559046 CET | 53 | 64785 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 19, 2024 14:21:46.303427935 CET | 192.168.2.4 | 1.1.1.1 | 0x6529 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 19, 2024 14:22:47.991146088 CET | 192.168.2.4 | 1.1.1.1 | 0xd317 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 19, 2024 14:23:51.278502941 CET | 192.168.2.4 | 1.1.1.1 | 0xe4c7 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 19, 2024 14:21:46.649912119 CET | 1.1.1.1 | 192.168.2.4 | 0x6529 | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:21:46.649912119 CET | 1.1.1.1 | 192.168.2.4 | 0x6529 | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false | ||
Nov 19, 2024 14:22:48.311491966 CET | 1.1.1.1 | 192.168.2.4 | 0xd317 | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:22:48.311491966 CET | 1.1.1.1 | 192.168.2.4 | 0xd317 | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false | ||
Nov 19, 2024 14:23:51.823559046 CET | 1.1.1.1 | 192.168.2.4 | 0xe4c7 | No error (0) | blogx.sina.com.cn | CNAME (Canonical name) | IN (0x0001) | false | ||
Nov 19, 2024 14:23:51.823559046 CET | 1.1.1.1 | 192.168.2.4 | 0xe4c7 | No error (0) | 202.108.0.52 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x840000 |
File size: | 126'464 bytes |
MD5 hash: | 51E6071F9CBA48E79F10C84515AAE618 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 1 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 08:21:14 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x670000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 08:21:17 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x800000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 08:21:20 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 08:21:21 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc30000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 08:21:23 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 14 |
Start time: | 08:21:23 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 15 |
Start time: | 08:21:23 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 16 |
Start time: | 08:21:24 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 08:21:24 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 19 |
Start time: | 08:21:24 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc30000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 20 |
Start time: | 08:21:24 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x670000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 24 |
Start time: | 08:21:46 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 25 |
Start time: | 08:21:46 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 26 |
Start time: | 08:21:47 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 27 |
Start time: | 08:21:47 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x670000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 28 |
Start time: | 08:21:55 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xac0000 |
File size: | 61'440 bytes |
MD5 hash: | 889B99C52A60DD49227C5E485A016679 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 29 |
Start time: | 08:21:55 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 30 |
Start time: | 08:21:55 |
Start date: | 19/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 31 |
Start time: | 08:21:55 |
Start date: | 19/11/2024 |
Path: | C:\Windows\SysWOW64\PING.EXE |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x670000 |
File size: | 18'944 bytes |
MD5 hash: | B3624DD758CCECF93A1226CEF252CA12 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 4.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 268 |
Total number of Limit Nodes: | 11 |
Graph
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008B7A Relevance: 5.1, Strings: 4, Instructions: 125COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003FB7 Relevance: 1.5, APIs: 1, Instructions: 4processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008AAD Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006EDE Relevance: 21.2, APIs: 5, Strings: 7, Instructions: 174sleepfileCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100064D5 Relevance: 14.3, APIs: 5, Strings: 3, Instructions: 283timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006CF7 Relevance: 12.3, APIs: 2, Strings: 5, Instructions: 72timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006499 Relevance: 10.7, APIs: 4, Strings: 2, Instructions: 156timeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008567 Relevance: 10.6, APIs: 3, Strings: 4, Instructions: 83sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000838D Relevance: 9.1, APIs: 2, Strings: 4, Instructions: 95sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006A6E Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64sleepthreadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008482 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 113sleepCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10007101 Relevance: 4.6, APIs: 2, Strings: 1, Instructions: 95sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100084BB Relevance: 4.6, APIs: 1, Strings: 2, Instructions: 90sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100069F2 Relevance: 4.5, APIs: 2, Strings: 1, Instructions: 43sleepCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100081F7 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 48sleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10006A58 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 27sleepCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1003748F Relevance: 1.5, APIs: 1, Instructions: 12threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F0A Relevance: 1.5, APIs: 1, Instructions: 10networkCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003FF7 Relevance: 1.5, APIs: 1, Instructions: 5COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004104 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004115 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000400A Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004092 Relevance: 1.5, APIs: 1, Instructions: 3registryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F72 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10008417 Relevance: 1.3, APIs: 1, Instructions: 48sleepCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000B224 Relevance: 1.6, Strings: 1, Instructions: 400COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000AEC0 Relevance: 1.5, Strings: 1, Instructions: 266COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10003F63 Relevance: 1.5, APIs: 1, Instructions: 4shutdownCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100121ED Relevance: 1.5, Strings: 1, Instructions: 216COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000B70D Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100053B7 Relevance: 26.5, APIs: 11, Strings: 4, Instructions: 226sleepfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 1000570F Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 103filethreadCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 10004391 Relevance: 9.1, APIs: 3, Strings: 3, Instructions: 61sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 100087F4 Relevance: 6.0, APIs: 2, Strings: 2, Instructions: 32sleepCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|