Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 6596 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 7823E902900881094372948957825FE1) - file.exe (PID: 2852 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 7823E902900881094372948957825FE1) - powershell.exe (PID: 5928 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nPath 'C:\ Users\user \Desktop\f ile.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3684 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 344 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nProcess ' file.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5316 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6808 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nPath 'C:\ Users\user \WindowsUp daterConf. exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3684 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 3060 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Execution Policy Byp ass Add-Mp Preference -Exclusio nProcess ' WindowsUpd aterConf.e xe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 4852 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - schtasks.exe (PID: 3796 cmdline:
"C:\Window s\System32 \schtasks. exe" /crea te /f /RL HIGHEST /s c minute / mo 1 /tn " WindowsUpd aterConf" /tr "C:\Us ers\user\W indowsUpda terConf.ex e" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 2872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WindowsUpdaterConf.exe (PID: 6184 cmdline:
"C:\Users\ user\Windo wsUpdaterC onf.exe" MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 6380 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 184 -s 114 4 MD5: C31336C1EFC2CCB44B4326EA793040F2) - WerFault.exe (PID: 3796 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -pss -s 716 -p 61 84 -ip 618 4 MD5: C31336C1EFC2CCB44B4326EA793040F2) - cmd.exe (PID: 5640 cmdline:
"cmd" /c t imeout /t 1 && DEL / f file.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 332 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 5940 cmdline:
timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
- file.exe (PID: 5780 cmdline:
"C:\Users\ user\AppDa ta\Roaming \file.exe" MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 6668 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 780 -s 121 6 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- file.exe (PID: 3020 cmdline:
"C:\Users\ user\AppDa ta\Roaming \file.exe" MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 1860 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 3 020 -s 114 0 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- WindowsUpdaterConf.exe (PID: 5960 cmdline:
C:\Users\u ser\Window sUpdaterCo nf.exe MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 5184 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 960 -s 120 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- WindowsUpdaterConf.exe (PID: 4040 cmdline:
"C:\Users\ user\Windo wsUpdaterC onf.exe" MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 3468 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 4 040 -s 116 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- WindowsUpdaterConf.exe (PID: 5688 cmdline:
C:\Users\u ser\Window sUpdaterCo nf.exe MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 5576 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 5 688 -s 114 8 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- WindowsUpdaterConf.exe (PID: 6024 cmdline:
C:\Users\u ser\Window sUpdaterCo nf.exe MD5: 7823E902900881094372948957825FE1) - WerFault.exe (PID: 2304 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 6 024 -s 113 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- WindowsUpdaterConf.exe (PID: 2756 cmdline:
C:\Users\u ser\Window sUpdaterCo nf.exe MD5: 7823E902900881094372948957825FE1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["185.196.8.239"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "8070077125:AAEdRIyp1anHye9Y0jcV8uNF6U4mmijN8Pk", "Telegram Chatid": "1818813749", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm_1 | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 10 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Click to see the 17 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:40:35.861908+0100 | 2853685 | 1 | A Network Trojan was detected | 192.168.2.4 | 49740 | 149.154.167.220 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:40:49.279298+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:01.792137+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:06.078519+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:14.306493+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:26.820479+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:36.074500+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:39.346854+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.039426+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.186711+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.354657+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:49.930287+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:50.493925+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:50.604514+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.183674+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.328908+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.498022+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:06.073461+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:08.885531+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:12.117835+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:22.726539+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:22.868735+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:23.040475+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:23.183664+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:26.601407+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:28.023630+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:33.680034+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:36.096593+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:38.227034+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:38.418978+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:43.696326+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:43.888449+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:46.372475+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:58.883827+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:04.245042+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:04.437499+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:05.040102+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:06.096583+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.274398+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.415537+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.594513+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.834543+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:22.322408+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:24.696129+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:29.688528+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:29.881428+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:36.090598+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:40.196613+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:41.339455+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:42.024594+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:54.541105+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:56.823146+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:57.103007+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:06.093314+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:08.658761+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:40:49.322470+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:01.794410+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:14.308474+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:26.822739+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:39.348559+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.042422+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.189182+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.357039+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:49.932460+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.504394+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.627833+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.797977+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.917747+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.186173+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.331341+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.501294+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:08.887117+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:12.119563+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:22.728656+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:22.871805+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:23.043784+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:23.186431+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:26.604303+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:28.025141+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:33.682516+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:38.229933+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:38.420604+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:43.704189+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:44.119844+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:46.375024+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:58.890884+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:04.246700+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:04.438814+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:05.042164+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.276672+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.417228+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.596237+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.839916+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:22.324503+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:24.698239+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:29.693242+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:29.883678+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:40.201444+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:41.341754+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:42.026533+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:54.547027+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:56.828046+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:57.108010+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:44:08.659555+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:41:06.078519+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:36.074500+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:06.073461+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:36.096593+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:06.096583+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:36.090598+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:06.093314+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:41:55.895664+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_031C8D58 | |
Source: | Code function: | 0_2_031CEF90 | |
Source: | Code function: | 0_2_031CD3E8 | |
Source: | Code function: | 0_2_031C0C70 | |
Source: | Code function: | 0_2_031C0C60 | |
Source: | Code function: | 0_2_061C4720 | |
Source: | Code function: | 0_2_061C1BB8 | |
Source: | Code function: | 0_2_061C2488 | |
Source: | Code function: | 0_2_061C4710 | |
Source: | Code function: | 0_2_061C1870 | |
Source: | Code function: | 0_2_06288C18 | |
Source: | Code function: | 0_2_06287D68 | |
Source: | Code function: | 0_2_0628F400 | |
Source: | Code function: | 1_2_011CE170 | |
Source: | Code function: | 1_2_011C9728 | |
Source: | Code function: | 1_2_011C4758 | |
Source: | Code function: | 1_2_011CD628 | |
Source: | Code function: | 1_2_011C1978 | |
Source: | Code function: | 1_2_011C4D70 | |
Source: | Code function: | 1_2_011C8E58 | |
Source: | Code function: | 1_2_011C8B10 | |
Source: | Code function: | 6_2_0485B490 | |
Source: | Code function: | 9_2_04C6B490 | |
Source: | Code function: | 9_2_08C53E98 | |
Source: | Code function: | 12_2_00A6B490 | |
Source: | Code function: | 14_2_032F0FAA | |
Source: | Code function: | 14_2_032FEF90 | |
Source: | Code function: | 14_2_032FD3E8 | |
Source: | Code function: | 14_2_032F0C60 | |
Source: | Code function: | 14_2_032F0C70 | |
Source: | Code function: | 14_2_06411BB8 | |
Source: | Code function: | 14_2_06412488 | |
Source: | Code function: | 14_2_06411870 | |
Source: | Code function: | 14_2_064D8C18 | |
Source: | Code function: | 14_2_064DF400 | |
Source: | Code function: | 20_2_00BBB498 | |
Source: | Code function: | 20_2_00BBB488 | |
Source: | Code function: | 20_2_081D3AA8 | |
Source: | Code function: | 22_2_00D78D58 | |
Source: | Code function: | 22_2_00D70C70 | |
Source: | Code function: | 22_2_00D70C60 | |
Source: | Code function: | 22_2_00D7198A | |
Source: | Code function: | 22_2_00D7D3E8 | |
Source: | Code function: | 22_2_00D7EF90 | |
Source: | Code function: | 22_2_00D70FAA | |
Source: | Code function: | 22_2_05682488 | |
Source: | Code function: | 22_2_05681BB8 | |
Source: | Code function: | 22_2_05681870 | |
Source: | Code function: | 22_2_05748C18 | |
Source: | Code function: | 22_2_0574F400 | |
Source: | Code function: | 27_2_00EED3E8 | |
Source: | Code function: | 27_2_00EE0C70 | |
Source: | Code function: | 27_2_00EE0FAA | |
Source: | Code function: | 27_2_00EEEF90 | |
Source: | Code function: | 27_2_058D2488 | |
Source: | Code function: | 27_2_058D1BB8 | |
Source: | Code function: | 27_2_058D1870 | |
Source: | Code function: | 27_2_05998C18 | |
Source: | Code function: | 27_2_0599F400 | |
Source: | Code function: | 30_2_01728D58 | |
Source: | Code function: | 30_2_0172198A | |
Source: | Code function: | 30_2_01720C70 | |
Source: | Code function: | 30_2_01720C60 | |
Source: | Code function: | 30_2_0172D3E8 | |
Source: | Code function: | 30_2_0172EF90 | |
Source: | Code function: | 30_2_060D1BB8 | |
Source: | Code function: | 30_2_060D2488 | |
Source: | Code function: | 30_2_060D1870 | |
Source: | Code function: | 30_2_06198C18 | |
Source: | Code function: | 30_2_0619F400 | |
Source: | Code function: | 33_2_01940C70 | |
Source: | Code function: | 33_2_01940C60 | |
Source: | Code function: | 33_2_0194EF90 | |
Source: | Code function: | 33_2_0194D3E8 | |
Source: | Code function: | 33_2_02391BB8 | |
Source: | Code function: | 33_2_02392488 | |
Source: | Code function: | 33_2_02391870 | |
Source: | Code function: | 33_2_06568C18 | |
Source: | Code function: | 33_2_0656F400 | |
Source: | Code function: | 37_2_0328EF90 | |
Source: | Code function: | 37_2_0328D3E8 | |
Source: | Code function: | 37_2_03280C60 | |
Source: | Code function: | 37_2_03280C70 | |
Source: | Code function: | 37_2_06241BB8 | |
Source: | Code function: | 37_2_06242488 | |
Source: | Code function: | 37_2_06241870 | |
Source: | Code function: | 37_2_06308C18 | |
Source: | Code function: | 37_2_0630F400 | |
Source: | Code function: | 40_2_01850C60 | |
Source: | Code function: | 40_2_01850C70 | |
Source: | Code function: | 40_2_0185EF90 | |
Source: | Code function: | 40_2_0185D3E8 | |
Source: | Code function: | 40_2_060A1BB8 | |
Source: | Code function: | 40_2_060A2488 | |
Source: | Code function: | 40_2_060A1870 | |
Source: | Code function: | 40_2_06168C18 | |
Source: | Code function: | 40_2_0616F400 | |
Source: | Code function: | 43_2_0300D3E8 | |
Source: | Code function: | 43_2_03000C60 | |
Source: | Code function: | 43_2_03000C70 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_0628ECA8 | |
Source: | Code function: | 0_2_06283944 | |
Source: | Code function: | 6_2_048542DA | |
Source: | Code function: | 6_2_04856341 | |
Source: | Code function: | 6_2_04853ADA | |
Source: | Code function: | 9_2_04C66351 | |
Source: | Code function: | 9_2_08C58C12 | |
Source: | Code function: | 9_2_08C58C22 | |
Source: | Code function: | 9_2_08C56DDA | |
Source: | Code function: | 9_2_08C58BD2 | |
Source: | Code function: | 9_2_08C58C42 | |
Source: | Code function: | 9_2_08C56BE9 | |
Source: | Code function: | 9_2_08C58BF2 | |
Source: | Code function: | 9_2_08C577F1 | |
Source: | Code function: | 9_2_08C58B92 | |
Source: | Code function: | 12_2_00A66351 | |
Source: | Code function: | 12_2_072A0E18 | |
Source: | Code function: | 12_2_072A0A59 | |
Source: | Code function: | 12_2_072A0A59 | |
Source: | Code function: | 14_2_064DECA8 | |
Source: | Code function: | 14_2_064D3944 | |
Source: | Code function: | 20_2_00BB42DA | |
Source: | Code function: | 20_2_00BB6371 | |
Source: | Code function: | 20_2_00BB3ADA | |
Source: | Code function: | 22_2_00D7432F | |
Source: | Code function: | 22_2_05743944 | |
Source: | Code function: | 27_2_05993944 | |
Source: | Code function: | 30_2_0619ECA8 | |
Source: | Code function: | 30_2_06193944 | |
Source: | Code function: | 33_2_0656ECA8 | |
Source: | Code function: | 33_2_06563944 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Registry value created or modified: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | File created: | Jump to dropped file |
Source: | Process created: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: | |||
Source: | File opened: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | HTTP traffic detected: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | |||
Source: | Window / User API: | |||
Source: | Window / User API: | |||
Source: | Window / User API: |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep count: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: | ||
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Code function: | 0_2_061C2E08 |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | |||
Source: | Process queried: | |||
Source: | Process queried: | |||
Source: | Process queried: | |||
Source: | Process queried: | |||
Source: | Process queried: | |||
Source: | Process queried: |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | |||
Source: | Process token adjusted: | |||
Source: | Process token adjusted: | |||
Source: | Process token adjusted: | |||
Source: | Process token adjusted: | |||
Source: | Process token adjusted: |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Process created: |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Disable or Modify Tools | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 111 Process Injection | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 23 System Information Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | 221 Registry Run Keys / Startup Folder | 1 Scheduled Task/Job | 11 Obfuscated Files or Information | Security Account Manager | 541 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 221 Registry Run Keys / Startup Folder | 2 Software Packing | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 1 Non-Standard Port | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 151 Virtualization/Sandbox Evasion | SSH | Keylogging | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 111 Masquerading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | 13 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 151 Virtualization/Sandbox Evasion | DCSync | 1 System Network Configuration Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 111 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
100% | Avira | TR/Dropper.Gen7 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT | ||
47% | ReversingLabs | ByteCode-MSIL.Backdoor.njRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ip-api.com | 208.95.112.1 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
185.196.8.239 | unknown | Switzerland | 34888 | SIMPLECARRER2IT | true | |
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1569488 |
Start date and time: | 2024-12-05 19:39:02 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 12m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 44 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@39/52@2/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 52.182.143.212, 52.168.117.173
- Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 5928 because it is empty
- Execution Graph export aborted for target powershell.exe, PID 6808 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size exceeded maximum capacity and may have missing disassembly code.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- VT rate limit hit for: file.exe
Time | Type | Description |
---|---|---|
13:39:55 | API Interceptor | |
13:40:03 | API Interceptor | |
13:40:33 | API Interceptor | |
13:40:45 | API Interceptor | |
18:40:05 | Autostart | |
18:40:14 | Autostart | |
18:40:33 | Task Scheduler | |
18:40:33 | Autostart | |
18:40:41 | Autostart | |
18:40:49 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
185.196.8.239 | Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | ||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
Get hash | malicious | Mirai, Gafgyt, Okiru | Browse | |||
208.95.112.1 | Get hash | malicious | Babadeda, Blank Grabber | Browse |
| |
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ip-api.com | Get hash | malicious | Babadeda, Blank Grabber | Browse |
| |
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
| ||
api.telegram.org | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
SIMPLECARRER2IT | Get hash | malicious | Socks5Systemz | Browse |
| |
Get hash | malicious | Socks5Systemz | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Nymaim, Socks5Systemz | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | RHADAMANTHYS | Browse |
| ||
TUT-ASUS | Get hash | malicious | Babadeda, Blank Grabber | Browse |
| |
Get hash | malicious | AgentTesla, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Babadeda, Blank Grabber | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsUpdaterCo_2713bfddc010d837993fc37b40d83573d89028b9_ecc25a9f_0107abb4-a8fa-41cf-a55b-64fcbc9d56ab\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0425739531387612 |
Encrypted: | false |
SSDEEP: | 96:mQFgnaxtHQJ5ZkcxLksLQXIDcQSc6f+cEdcw3H+BHUHZopAnQHdE7HeS9+xWAKTl:74MtO20cb+n6aSchhzuiFjZ24IO8dc |
MD5: | CC178E01E988DA051210DDDEC4B28F47 |
SHA1: | ACE72E04433116E80FAC7B121A0CCC6C7D729AF8 |
SHA-256: | 0D375F7B2B23E5F34745FA80908F9151B6B6786300B717CC05CB5F36CFD69EC1 |
SHA-512: | 03A54ECB56C551191FCC90F076B0B50E5D3872F9F34C7F6FA9E85AC5A0D4B2F8765AC38D29D497424BB76054B0935A22A0E8B6B444A63BF119981D1709B9DC75 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsUpdaterCo_2713bfddc010d837993fc37b40d83573d89028b9_ecc25a9f_2cc00e63-2db3-4ebc-807e-9b6cf8994693\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0488263975582648 |
Encrypted: | false |
SSDEEP: | 192:pH+tO20cb+n6aGXL5TzuiFf9Z24IO8dc:Z+tscSn6a+JzuiFFY4IO8d |
MD5: | E7ACBDA576BB9CBE05D491FD3501BBEC |
SHA1: | 34AFC308AAC78C78BBC86EB50D4B2C4561A696BE |
SHA-256: | 3A232A61362D518BBCB1F9894D4B3D78B62AB35747582CF8F132F8F175694780 |
SHA-512: | 475122DBF68774C1C2AFFAE4897BE06A71ECF9B99BF48C46ADC3C9780E98B9F7A13E98D3690F159EC518226C0495094685B4826DA1DB8CDDE3D577B1CE5843EC |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsUpdaterCo_2713bfddc010d837993fc37b40d83573d89028b9_ecc25a9f_4128d7db-ca29-4c7c-b27a-638b6156a929\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0425965202650278 |
Encrypted: | false |
SSDEEP: | 192:x3O9y0O20cb+n6aichhzuiFf9Z24IO8dc:o9y0scSn6aRHzuiFFY4IO8d |
MD5: | 9F4A319E9DFD7A7ED40B63DE332169B3 |
SHA1: | B2DCB932E358F3CCEDD33145D1BF4965E2B5EEE6 |
SHA-256: | 0F7E8D08EA63F47A0E42AB05567CA80925FFF3426EC556D53EC23C77ACB62E8E |
SHA-512: | 0D4D7336DFD16898468E4318F9FB97E9D140C7B6C4576DAB1285225D6AB30EEA985E9A0EE9D01BF103BC64C354F32C693134663E7F90BC81E432748475C1D2AA |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsUpdaterCo_2713bfddc010d837993fc37b40d83573d89028b9_ecc25a9f_43688d22-8a4d-4d54-b1e8-1756b234d657\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0424401258828546 |
Encrypted: | false |
SSDEEP: | 192:FkXFO20cb+n6a6chhzuiFf9Z24IO8dcr:SXFscSn6apHzuiFFY4IO8d |
MD5: | 280279A758BF7156D0167C0D8463537F |
SHA1: | 03AB2780E76A16DF51836749948510543AC9F32C |
SHA-256: | 09B9F428BC03F2BFDB14158909585AD5CE17B1439EA60C30E7EFF2D82ACFD5DA |
SHA-512: | 508474DB45C474916D4F2A5F3CA1AB42FFC027F345536736B808515D31DDAA2CD02E36BE0BF7C5FEED7268FF4317544BB7B4BE05D845C518A02757C36EAE3A67 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_WindowsUpdaterCo_2713bfddc010d837993fc37b40d83573d89028b9_ecc25a9f_45586236-1818-4904-9be7-c64612bee974\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.042563090908419 |
Encrypted: | false |
SSDEEP: | 192:SoVGAHbO20cb+n6a6chhzuiFIZ24IO8dc:SwLHbscSn6apHzuiFIY4IO8d |
MD5: | EC71C659BD6A08B3D1278006E7E3ECDF |
SHA1: | CCE18A8FDD4942680B435086DB64411A4D53129E |
SHA-256: | B8202A4F15287698F853358FAC54160D2EEAA2BCF5CFC197CB804D6558F5FAE6 |
SHA-512: | 56498CDB9717AB07E448840B7C2B480D2CC7509AD70750A827203FB379DC42F305D1BBF73C30F651AF0847BB24D616542031AD2B82215DC189F5312620FC1C25 |
Malicious: | false |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_75a55460d61773bd51cf531a12c409793a627c2_4b931c09_12131765-486c-4f47-856d-fb5b70fab621\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0410223725671461 |
Encrypted: | false |
SSDEEP: | 192:rwgBUHvcxyb20cb+nRqxaGXL5TzuiFf9Z24IO8HzB:HOyycSnKa+JzuiFFY4IO89 |
MD5: | 7A0BCE69001069D8BC495EF499CD2404 |
SHA1: | 5EB62D41F24A268AE2B4A0CD8D6805EDA4CB7989 |
SHA-256: | D265D64544AF4566D0FFE83DD08F045726FC610C8C5FE0B20BE27E39DAD62B0C |
SHA-512: | BC93EA59FAB32DF589BE2C4A574E38D845D290DD0686E77243479598321DA46F236E2C9CA955FAD5BA41A9B7FCFA1C9AADEE2694BABB21D0834EF88FBD9E645F |
Malicious: | true |
Preview: |
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_75a55460d61773bd51cf531a12c409793a627c2_4b931c09_d7761b0f-1f49-425c-814f-9fe63ef7c766\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.034391585899798 |
Encrypted: | false |
SSDEEP: | 192:FwiB4zHv5/yb20cb+nRqxaichhzuiFf9Z24IO8HzB:6g4jRycSnKaRHzuiFFY4IO89 |
MD5: | 6E26BD48FF82691A9502F188B3736B76 |
SHA1: | 5E07AD981063E5D4E60CA3DC7B108EFDD2A407F0 |
SHA-256: | 416CB54229EC0537294588CCBD87BE66E99CFE5B066F14A431BD3A10D75C3B86 |
SHA-512: | 3ECB434DF5644AC79FFEA05A56149106D48B62E32C04A77A0E7B5B845679A476C67C4F28887419CA0889ECF45A6347E1970FE5CB95483F66080D800092839F0A |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 220546 |
Entropy (8bit): | 3.8709952393219416 |
Encrypted: | false |
SSDEEP: | 3072:SHLgDf4uEqyyGOLTgsGqluJotCnw/gf46:Skj4518TgGFc1f |
MD5: | 3B106A1F56680E397F7576EF5E984946 |
SHA1: | B586D1EF6C2971055123E914E6DBF9F5430941D3 |
SHA-256: | 3C8D13E6FADB01D0CB8B5202DCE25495941DEFE06A10A66635DC21E967E86B9C |
SHA-512: | F3A0C1DC8500BFAEC7EEB509DD80363132A58FB36EAAF20A87BF095B74C1031DCEC7C8B5C022235D1A0BA0A5BD8CB8DA7DF6ADE8C5B2721323E88EDB1E8AC198 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8416 |
Entropy (8bit): | 3.690385673854538 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJCE6rK6Y9tSU/ZwBCgmfZ//MIrpDQ89bWnksfWaym:R6lXJh6e6Y3SUxkCgmfx/vWnXfJ |
MD5: | 66F3287B03B322C09A3F90F1723B100D |
SHA1: | 58E07AC72CFF04371C59D5E1FB19477745AD1C64 |
SHA-256: | 7E58C63D52F20514CFFA767090089BBF2BDCC6BDBE00D7C0D3BB207629D7C71B |
SHA-512: | 6E149B92C9DB8A60EF7E5BC2C888674A7233C68F0CF4867770CAA601DED34382FAD8EBF87F461D5D34787065220DD5DBC8F9CA9AFFDFB84BE589D3BC86C1DFFD |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.47606919670625 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZpJg77aI9LAWpW8VYgYm8M4Ju/7PFn+q8vc/7JJuvC/KBJg2kNd:uIjfdI7V57V4J0K0JuvLg2od |
MD5: | 6909905FFC8BFFA352B0CB0787C51FB3 |
SHA1: | A43AE8EE66FE339DDF8C7E79D829BE1F32F87B72 |
SHA-256: | 30D0F8C9D43D57551E988977C11566EB649540DA1D1CCE3666E143A69F00CA7B |
SHA-512: | 5EF990589D7090B45E8D84A1B602BB7C12AD3EA1B96FC39B78D580D74F3878E41378F8491D0812D52E42CF644FEE61D2AAEAEB57086FBF7547A2C6588FCBE1F6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 228262 |
Entropy (8bit): | 3.9235155941035607 |
Encrypted: | false |
SSDEEP: | 3072:Ob7TgioCAQd4uEqomLTg7Vrq1KG86rZy7ef:W7U/J44MTg7Vr48sf |
MD5: | 56FEC9E49984E854A2EC2C5DE20DD0DB |
SHA1: | CAAA8D171E648A68EEE65EA6ABF83FBD13FA6766 |
SHA-256: | 4A149E21542130EE906110982478F50CEBDFF0CAF937A8945F7039D20719F41E |
SHA-512: | 2D299FA3FDD636843D1FDFC6F09DD6269A8DBB8C70CEC631F08460D2774556711FDFAD24D38143216C81C9B64928A23EFDA85185644F97DDE6B6C76C9BCED5DE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8398 |
Entropy (8bit): | 3.685388185272187 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJRP6vqAe6YEfCSUUcgmfZ//MIrpDT89blbysf8fjm:R6lXJ56U6YEKSUXgmfx/GlbxfM6 |
MD5: | 8E1D659138AF66EB91E0E70B973EB001 |
SHA1: | 54BA1EC9B292C9AEDAB8DB3278EB662D4208CF20 |
SHA-256: | 60098FBC099B5DECC502230E3FD0670364FFFA1D5D0A39CCACB325E7D29D17EF |
SHA-512: | 284536534F236DB2903578F26743333F87950BD87F28844B04EE3C31BDC4D0E1F2674D172DDD7A6509480E5623DF3326F85F81E1ED63A4C27A0C80C3A67A5FE5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 224160 |
Entropy (8bit): | 3.976298803735886 |
Encrypted: | false |
SSDEEP: | 3072:QJ0EBiDsQ4oI4uEqGLTgVo3OqNYxJjlno2:QJhsJI43Tg47C |
MD5: | D8C7FDF9A910BC3BB0739F2EB460B3CE |
SHA1: | A9AE49CECA66DC2622F19192A93A1CCDE9273272 |
SHA-256: | 71FF409DAF432B461DB366570066F68B1D91F7E7FF96C185B40B24CD53D52BD6 |
SHA-512: | DDBD0EF3F4FB6530FD95BD9C5ED6D495769C4136EC1EA17992A6A20F966B5718D2FFA5CA8F5C10606DBCBEE3F78DB459C5E4C66CEF3FBF6601D4864AB505942F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.477070785906129 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZDJg77aI9LAWpW8VYlYm8M4Ju/7PFHw+q8vc/7QhGuvC/KBJg2zNd:uIjf7I7V57V5J3KmuvLg2xd |
MD5: | 8085A79DFD6D192F4E3849F9DE7533DE |
SHA1: | 6A4155B51A90289A4F066B9CA8A5CA84076CF1CC |
SHA-256: | CAF2AA185391CAF9D8F2D6AB4C90A6B99E421F46F40660F6610D0561EC641705 |
SHA-512: | 059F8D6254ABB4745FBA2F89831FF55F9E501BAD0051E95EE61A4BB87104C287A0C41A0D1859C1CC85ED312FA6BFE9E276FBA99B9AE8ECA60B2704AE17B99F80 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8416 |
Entropy (8bit): | 3.688024465446068 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJxz6eB66Y9KSUhZUJ6gmfZ//MIrpDt89buQsfQ6m:R6lXJF6N6YgSUfw6gmfx/IujfM |
MD5: | D9183DD5C79609A5A00ED66323B25906 |
SHA1: | 0E7883498A430DA732F0B9939C77064FD9ACFB9D |
SHA-256: | E03C620F5701A6575757F541E6368EF252F86FBCEBD1A5720EEBD823F9784D8C |
SHA-512: | FFA42770FDB8FD5135AA941702F3740BC48EE5F6FA4FA65D101249481570EBC11ADE7DC8B61FBA259101DE607A53CBD34FB8BDF138506EDD9B34CD0F27E48B8B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.475982404524727 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZpJg77aI9LAWpW8VY8Ym8M4Ju/7PFvv7BI+q8vc/7MuvC/KBJg27Nd:uIjfdI7V57VMJ6VIKjuvLg2Jd |
MD5: | 5FB94BC07538E8B7C49AC498067CC099 |
SHA1: | AF6E00EE615A00E2E6C017D7B8CDB15242436620 |
SHA-256: | 8F2F7E5B1EAEE8F991FE03F726CD813E16C7351AA3A82CF85D05F9463E83CD17 |
SHA-512: | D71408B716E33D38A684FC729D6797B8BA6FCBF90C1D9B73F77DB61FCE49AFF079D0539061713A31587397EF9207013AE68C826041FD1F1B81CE27342495B3D9 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 217468 |
Entropy (8bit): | 3.920371364074599 |
Encrypted: | false |
SSDEEP: | 3072:tHTzFl1AxN74uEqy1WLTg4WsFL7xTtigeB+:tHtH8F4jeTghs9xn |
MD5: | D9B7984FD81D1A00889DB239C8A2DBB6 |
SHA1: | D607AA47D3D30AE3D27B8F4BD4C826B5A2CED011 |
SHA-256: | 961A6E4A2B19A5FBD58259105C04565D7AC85B1B690E10CEE6D9DB7B1C2C02B0 |
SHA-512: | 5C27F050435691CD673B4CBCD715BA9EA2A7FFA9F7788C149166A84B0E052ABDCADCB3838E4DDFE7B22717E6FFE3D3042264267E074603F2760FA591842CA20C |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8398 |
Entropy (8bit): | 3.6889699841648307 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJyPb6A46YEfnSURgmfZ//MIrpDG89bKbssfEGOEjm:R6lXJCb6H6YEvSURgmfx/NKb/fE26 |
MD5: | 80E707A231AF5C8261E896326B456DB5 |
SHA1: | 192A5208F193917D0B047090B552B839820DA9C1 |
SHA-256: | 8C3F066AD66B6DE4082A5D6C3D0E5D89CC4D7A286EB1114AC7DC53C58E83F087 |
SHA-512: | AEA363B195DEF026835DD3480892E17EA24B1BD28E5C8BAEE8A04C7099BB89848DCD0ECAE31A6DB3EC9BE30AE6F2DC5788B89CB01AAF230443345943C6BB80EB |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.479024748407362 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZUJg77aI9LAWpW8VYvYm8M4Ju/7PFj+q8vc/77+uvC/KBJg2uNd:uIjfAI7V57VXJwKxuvLg2md |
MD5: | 14A704E7AF641C7D401805CBC122A5C6 |
SHA1: | 5267196D22C9598B9B74C9A3126399D2C72EF7DF |
SHA-256: | 3D8511D3489E201ACE99F5E053CEAE3F25FBEA02F902C8AB0E68139CC448C47E |
SHA-512: | D6A2158226B1126FCB576CFC2FAD29105FC3B1B25DE4262D3431F2897C96D6FFB2274AD0137DD72872D61FA4907B0B16778E8BBB80647F152E2E0E5B97569DF6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 220622 |
Entropy (8bit): | 3.8824151316534037 |
Encrypted: | false |
SSDEEP: | 3072:cGOFn462I74uEq5XLTgscXEcP9ii4+BvWCRz:cGe4YTgDX1t4M |
MD5: | D9E3F65CFD0C6181318EB6B44FD06CA0 |
SHA1: | 25E45A034D7C4B16988C761AA5594F0FE6FA91CE |
SHA-256: | 7DB40E05C3B7A63B8EF453B170C0279BA59063F0AB4AD2E8143E2A7431E040F9 |
SHA-512: | F0FBFBA1670DC91AADF85BA32BBB2D30FDBD0E0B55554270F6BF8487434C060652D7E8C5FF237C595D2E3FBDD9A452E757D972303857E931332EF19F77A03482 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8360 |
Entropy (8bit): | 3.689606187196721 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJuCJh6BJ6Y9hSU9wZ7WgmfZDF/MIrpDH89bvUsfSFm:R6lXJbh6BJ6YbSU9M7Wgmf//6vHfZ |
MD5: | 67CE5400D7CF79A851C3224E52A7E887 |
SHA1: | A3D3F017981BF134DE286E7E02DCE477DE3FB350 |
SHA-256: | F153C89E6E3173FAA74CC8025D7887F6C341D714C868FC2FD45A52C66EE9AA4D |
SHA-512: | 9A0600442219125A6AC4E7B75450EC132DB08626A5D0E0414FFDE3749E56AD4C7A47DD87A5414799A9CAC41647B20D680C65044942D36E8E23C13AA39A232DE0 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4710 |
Entropy (8bit): | 4.441791627178954 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZpJg77aI9LAWpW8VYNbYm8M4Ja/7PFqW+q8v2/7b26/ErXNd:uIjfdI7V57Vk+JWKSmr9d |
MD5: | 0B911E63E928C7CF99D07807C938FBA4 |
SHA1: | 24F00368A3A4CA8FBC5B77257A54314C3B6920F0 |
SHA-256: | D961CC6D5BEA1B5A56827DA83E1811B83106195F2A500724185B1F6636CFE3D8 |
SHA-512: | A65A86660E4CA172EEA5156942E8955A94D56CCC6F48A9E73B18E7A0A6314B61560068A8C178BA842024D210F2461AD63FEB5778684DF783ACA1CBCC56D06F3E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 216952 |
Entropy (8bit): | 3.8832602512021643 |
Encrypted: | false |
SSDEEP: | 1536:Pz1L+g1zXL/8AGli0tTQ7D+BpN4uE2aOLNVHylLTgXmuwuBojR/LHJmF81LOCD32:L15rmR8it4uEq7ylLTgXmlLJmK5N3SV |
MD5: | 3BABD344015031AF1BF4CE00E82086F8 |
SHA1: | 8744D63EFA2843F55B45AA0240D43EAD7B9F707D |
SHA-256: | 7BB3AFDCC7C6C5B9F6ADCE97F05CCCF0812041F74D177F194AEF52512D5FB976 |
SHA-512: | 519FA6C8334D74601587B9025EC8634F8141412D52F5C2FDA0FF484D8C961C66A76E5D9FA7605D61F6714A7DB053EF070056D70210924AC906F5305934A907E5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8360 |
Entropy (8bit): | 3.6876184223313566 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJjCo6E06Y9CSU9IZx6wgmfZDF/MIrpDT89beRsfoqm:R6lXJx616YISU9kowgmf//GeKf0 |
MD5: | 119B3C54CCB0057B8A59847118E36E8A |
SHA1: | D423DD0E5D61653005ED80C7951D60F1D3E5B0BA |
SHA-256: | 95CA73850357B37EA2504BDE86476AF708A55D4AC3599B6D60A547BEDFDBCBF6 |
SHA-512: | D9D1B955E33D4202C7BE0A707E6368991ECCA19903CBAAD52BCE332D167B7CE8D94016E1BF59CEFD27297A09F0427C44B99BF13675C009B54B99DFEA8AB7D4B6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4710 |
Entropy (8bit): | 4.443963422237909 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZpJg77aI9LAWpW8VYHYm8M4Ja/7PFOo+q8v2/71J26/ErLNd:uIjfdI7V57VHJyKymrZd |
MD5: | 4C71C0D38E55B324E35D3C1F425968AE |
SHA1: | 295130B9FD14E3834B7ECDED61548B839F15DB0C |
SHA-256: | 69E1728530B1AE118D2E0C7BA08CB5E25ED56D7068852AE15C7D099247906BED |
SHA-512: | 008BD79DC0923047597BD6615516AC0C06DDA78BEA5EF89A31DD08BB07FAB88AC4FF06C13FB938F1852159F0A9F4E855C55BB8FFA08ED10565E82B03AFEAFD21 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 214612 |
Entropy (8bit): | 3.7323996584608645 |
Encrypted: | false |
SSDEEP: | 3072:ALqJ7jfATcM4uEq9VLTgCSU4QE3GjqcTV:AeJficM46BTgCSZbO9 |
MD5: | D4812C08F3FBF0E2648B8B70391307C7 |
SHA1: | F5CEB7895C30BCE3C2209220EF2FD54385B30683 |
SHA-256: | 366F27EB9E105B0BF39F1A367E7A82E68B6E173A4E5037B0069AA3ECEA44E5FC |
SHA-512: | C87B173F4A999F36FE6564B07F60D8050582A31251D176B67EBEBF3FCBD7FDEFD4E7D2408546142A833001BE9AC3419FAD275F6667392B8F001B70187851FCE8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8398 |
Entropy (8bit): | 3.6879435249604096 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJpNk67Ao6YEf3SUrgmfZ//MIrpDa89bPBsfKlm:R6lXJpO67Ao6YEPSUrgmfx/BP6fx |
MD5: | 25ABAB02849E9DA99FA8711A91A4C022 |
SHA1: | F8189816FE1BFF8AF954FFD53180A1A78567DCAD |
SHA-256: | 632201C42CE4365A27D399126A6C48B7E0D72F4D6640B6888D4D86752A41EE77 |
SHA-512: | CFC35ED6D08B899728AB32B313EA8923ED3EC84B718EDDDE7900544949232E3E2D68BDBA457094193438A1809A8E0F79E311E1619CEE4EDDEB875B8D890DBE4E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.476789336443529 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsZpJg77aI9LAWpW8VY/Ym8M4Ju/7PFeE5+q8vc/7huvC/KBJg2oNd:uIjfdI7V57VnJk5KmuvLg2kd |
MD5: | FBC8CAB8685A7D80FBA8E622B2F96A9D |
SHA1: | 70E1F5F9EE92C6505D672BF5BF967B8EB5BD3897 |
SHA-256: | 06509142679B68E2C1DABF52589098ABC25DCC2657234024FB2590158DF37601 |
SHA-512: | B558F34EC9E19E2A868B30699054784FD1EAFF600468F81B9DA4D814A904206E52E9B0A484642CF508246D59E1B7200CC37141FB3A65A9EC0435C5E72F72F1F4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 642 |
Entropy (8bit): | 5.345222650979019 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPTAWzAbDLI4MNldKZaOKbbDLI4MWuPJKAVKhav:ML9E4KjsXE4qdKtKDE4KhKiKhk |
MD5: | 5A42AAF6EED5DE763D78B81161E562E5 |
SHA1: | 0BC3C9744F480E22AD27C7B9BEC85CB63C757CE0 |
SHA-256: | 54062224FE33D8E74A490BA90BC259AFB569F4867AC1946C722B22F7550D64BB |
SHA-512: | 877BA9FA0B49D9D71818C6F94C86F215D9322CA4694CA37B2DE0592B89C4A98E44DEEA9DBF78F3AF6512C5403F0B6EF9035ECB9627C091383D3E899ADAB62D4A |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | modified |
Size (bytes): | 2232 |
Entropy (8bit): | 5.38001807625381 |
Encrypted: | false |
SSDEEP: | 48:jWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//ZcvUyus:jLHyIFKL3IZ2KRH9OugQs |
MD5: | 15A37A4026B58AF7B5B3AD00D9059D4E |
SHA1: | 404F66EDC3AC45EF497F5A7B4691AC69CC2305B4 |
SHA-256: | B1D1BA4774A144D850128F604B1926641AC829C9FFB9B7D648C863078BAD62A8 |
SHA-512: | E886E1B9A6F6A2693B8D24390DB9DB569FDD5BF56BE6B63502B04C4F36B5D765CBC77AD30A240E2946B48B0E58D1243CC48D59BEAA808D82532A82E4DA9956B7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | modified |
Size (bytes): | 58 |
Entropy (8bit): | 3.598349098128234 |
Encrypted: | false |
SSDEEP: | 3:rRSFYJKXzovNsr42VjFYJKXzovX:EFYJKDoWr5FYJKDoP |
MD5: | 5362ACB758D5B0134C33D457FCC002D9 |
SHA1: | BC56DFFBE17C015DB6676CF56996E29DF426AB92 |
SHA-256: | 13229E0AD721D53BF9FB50FA66AE92C6C48F2ABB785F9E17A80E224E096028A4 |
SHA-512: | 3FB6DA9993FBFC1DC3204DC2529FB7D9C6FE4E6F06E6C8E2DC0BE05CD0E990ED2643359F26EC433087C1A54C8E1C87D02013413CE8F4E1A6D2F380BE0F5EB09B |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdaterConf.lnk
Download File
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 814 |
Entropy (8bit): | 5.15780255210316 |
Encrypted: | false |
SSDEEP: | 12:841X4lT1+Oj6CIUlqi9Eg9jA6iwRaW+EgWawuLvqAnenG44t2YZ/elFlSJmZmV:8tlBgnUlXEEA6iwRD+EKPqIuVqyFm |
MD5: | 19360AC82919CA72B1045AB755EF69A8 |
SHA1: | D957BEAAAC961491963D67222F9581B5ADCAD361 |
SHA-256: | A37C41366EE17EE998748B91868FDCCAC84F51FC3953B583588274AC924D6501 |
SHA-512: | 3E566204D27E43FAC20D5A80388EF258119034634E16C1628E2B0751A0A7ECD06B254962DA0972093C4E7F62AFD145C9EAC710C0082896A4AC10874710C472AD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3507712 |
Entropy (8bit): | 6.995081946176499 |
Encrypted: | false |
SSDEEP: | 24576:kAehczkVjrQEwCsO0FtOyjQJRch9FCXuHxcXYuQEnWSMhPYz9GSU7uu0cGVh9t0q:kAuDPy2Rpe0WVNYzMAL9htLAcbklta |
MD5: | 7823E902900881094372948957825FE1 |
SHA1: | 297A663F3B64FB9863164D10AC698BEF03DD3A0F |
SHA-256: | 92D36E5FB3FDBF10AD10C7880C40013C2E21B8A49E20720137D2B4851681233F |
SHA-512: | 60D4EA35CFEC5154CFA3CB767DE7C839CA8B3987B27599EA218EC1C47F1D111A59F193CD3CFD1266AE384434AE653F1E0A297F7222A2592E529B2B4404DD6238 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 3507712 |
Entropy (8bit): | 6.995081946176499 |
Encrypted: | false |
SSDEEP: | 24576:kAehczkVjrQEwCsO0FtOyjQJRch9FCXuHxcXYuQEnWSMhPYz9GSU7uu0cGVh9t0q:kAuDPy2Rpe0WVNYzMAL9htLAcbklta |
MD5: | 7823E902900881094372948957825FE1 |
SHA1: | 297A663F3B64FB9863164D10AC698BEF03DD3A0F |
SHA-256: | 92D36E5FB3FDBF10AD10C7880C40013C2E21B8A49E20720137D2B4851681233F |
SHA-512: | 60D4EA35CFEC5154CFA3CB767DE7C839CA8B3987B27599EA218EC1C47F1D111A59F193CD3CFD1266AE384434AE653F1E0A297F7222A2592E529B2B4404DD6238 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.465612679391392 |
Encrypted: | false |
SSDEEP: | 6144:cIXfpi67eLPU9skLmb0b4MWSPKaJG8nAgejZMMhA2gX4WABl0uNDdwBCswSbV:hXD94MWlLZMM6YFHB+V |
MD5: | 40A448533EDD58F024831DAB7D6C1727 |
SHA1: | 0543C67282582B9A449EBD12A367EECB83E96EB8 |
SHA-256: | 9D61EE7E010C05DD48D6FF148AFB49B09B4F58833F4DF4F0AB0F5BB673DE5640 |
SHA-512: | 27B1F993F3D620A499070B8D99EF0A9F83834E1947CA40C5B87C51AD81B2A978F5844ABFC15A11219D55273F667F26A5F11E597C03A11FC9508FFB6AE1C73730 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 6.995081946176499 |
TrID: |
|
File name: | file.exe |
File size: | 3'507'712 bytes |
MD5: | 7823e902900881094372948957825fe1 |
SHA1: | 297a663f3b64fb9863164d10ac698bef03dd3a0f |
SHA256: | 92d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f |
SHA512: | 60d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238 |
SSDEEP: | 24576:kAehczkVjrQEwCsO0FtOyjQJRch9FCXuHxcXYuQEnWSMhPYz9GSU7uu0cGVh9t0q:kAuDPy2Rpe0WVNYzMAL9htLAcbklta |
TLSH: | 35F552C2C1E04AA1DBA01D7A5B6AD3591AD60767CA56E351C73F12F31F22F3C21B81E6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Qg.................|5...........5.. ....5...@.. ........................5...........@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x7599fe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6751EED8 [Thu Dec 5 18:20:08 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3599b0 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x35a000 | 0x4f0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35c000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x357a04 | 0x357c00 | c6e0fa529647ba2c45f66eb99c32a565 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x35a000 | 0x4f0 | 0x600 | a9d82a0f2d35672e1ff9f7c6ffc523eb | False | 0.3795572916666667 | data | 3.803200380192977 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x35c000 | 0xc | 0x200 | 16df37463a82b6da56900d9e0a61a11d | False | 0.041015625 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x35a0a0 | 0x264 | data | 0.46405228758169936 | ||
RT_MANIFEST | 0x35a304 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-05T19:40:35.861908+0100 | 2853685 | ETPRO MALWARE Win32/XWorm Checkin via Telegram | 1 | 192.168.2.4 | 49740 | 149.154.167.220 | 443 | TCP |
2024-12-05T19:40:48.866202+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:40:49.279298+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:40:49.322470+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:01.792137+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:01.794410+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:06.078519+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:06.078519+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:14.306493+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:14.308474+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:26.820479+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:26.822739+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:36.074500+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:36.074500+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:39.346854+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:39.348559+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.039426+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.042422+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.186711+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.189182+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:44.354657+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:44.357039+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:49.930287+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:49.932460+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.493925+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:50.504394+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.604514+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:50.627833+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.797977+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:50.917747+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:55.895664+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.183674+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.186173+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.328908+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.331341+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:41:56.498022+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:41:56.501294+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:06.073461+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:06.073461+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:08.885531+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:08.887117+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:12.117835+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:12.119563+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:22.726539+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:22.728656+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:22.868735+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:22.871805+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:23.040475+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:23.043784+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:23.183664+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:23.186431+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:26.601407+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:26.604303+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:28.023630+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:28.025141+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:33.680034+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:33.682516+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:36.096593+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:36.096593+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:38.227034+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:38.229933+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:38.418978+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:38.420604+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:43.696326+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:43.704189+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:43.888449+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:44.119844+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:46.372475+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:46.375024+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:42:58.883827+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:42:58.890884+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:04.245042+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:04.246700+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:04.437499+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:04.438814+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:05.040102+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:05.042164+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:06.096583+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:06.096583+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.274398+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.276672+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.415537+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.417228+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.594513+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.596237+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:14.834543+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:14.839916+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:22.322408+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:22.324503+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:24.696129+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:24.698239+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:29.688528+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:29.693242+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:29.881428+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:29.883678+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:36.090598+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:36.090598+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:40.196613+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:40.201444+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:41.339455+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:41.341754+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:42.024594+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:42.026533+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:54.541105+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:54.547027+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:56.823146+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:56.828046+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:43:57.103007+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:43:57.108010+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
2024-12-05T19:44:06.093314+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:06.093314+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:08.658761+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 185.196.8.239 | 7000 | 192.168.2.4 | 49742 | TCP |
2024-12-05T19:44:08.659555+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49742 | 185.196.8.239 | 7000 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 5, 2024 19:40:01.995919943 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:40:02.116771936 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Dec 5, 2024 19:40:02.116842985 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:40:02.117707014 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:40:02.237591982 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Dec 5, 2024 19:40:03.304946899 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Dec 5, 2024 19:40:03.347439051 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:40:33.851852894 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:33.851895094 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:33.852011919 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:33.871160984 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:33.871187925 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.243087053 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.243175030 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:35.245450020 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:35.245455027 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.245825052 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.296448946 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:35.343333960 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.861960888 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.862073898 CET | 443 | 49740 | 149.154.167.220 | 192.168.2.4 |
Dec 5, 2024 19:40:35.867651939 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:35.882343054 CET | 49740 | 443 | 192.168.2.4 | 149.154.167.220 |
Dec 5, 2024 19:40:36.187557936 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:40:36.307568073 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:40:36.307650089 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:40:36.357579947 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:40:36.477538109 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:40:48.866202116 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:40:48.988234997 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:40:49.279298067 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:40:49.322469950 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:40:49.442348957 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:01.382441044 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:01.502264023 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:01.792136908 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:01.794409990 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:01.915745020 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:06.078519106 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:06.316313028 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:13.895421028 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:14.015795946 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:14.306493044 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:14.308474064 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:14.429714918 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:19.101371050 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Dec 5, 2024 19:41:19.101439953 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:41:26.410706043 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:26.530697107 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:26.820478916 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:26.822738886 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:26.942806005 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:36.074500084 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:36.128921986 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:38.926145077 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:39.046004057 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:39.346853971 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:39.348558903 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:39.471750021 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:43.394783974 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Dec 5, 2024 19:41:43.514779091 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Dec 5, 2024 19:41:43.629508018 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:43.749242067 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:43.749310017 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:43.869107962 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:43.869158983 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:43.988946915 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.039426088 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.042422056 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:44.162599087 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.186711073 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.189182043 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:44.353354931 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.354656935 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:44.357038975 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:44.477087975 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:49.519803047 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:49.639518976 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:49.930286884 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:49.932460070 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.052314997 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.052375078 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.172205925 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.172277927 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.292128086 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.292351961 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.412225008 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.493925095 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.504394054 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.604513884 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.624514103 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.627832890 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.748508930 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.796400070 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.797976971 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.917655945 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:50.917747021 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:50.940540075 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:51.051028013 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:51.081512928 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:51.081679106 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:51.201649904 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:55.771337032 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:55.895565033 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:55.895663977 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:56.015903950 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.015991926 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:56.136629105 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.183674097 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.186172962 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:56.305918932 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.328907967 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.331341028 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:56.497447014 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.498022079 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:41:56.501293898 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:41:56.624603987 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:06.073461056 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:06.144622087 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:08.474266052 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:08.594216108 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:08.885530949 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:08.887116909 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:09.007143974 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:11.707806110 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:11.827825069 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:12.117835045 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:12.119563103 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:12.239248037 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.316967010 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:22.436681986 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.436754942 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:22.556427002 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.556670904 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:22.676593065 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.726538897 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.728656054 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:22.848611116 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.868735075 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:22.871804953 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:23.033428907 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:23.040474892 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:23.043783903 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:23.163444042 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:23.183664083 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:23.186430931 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:23.349806070 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:26.191755056 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:26.311572075 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:26.601407051 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:26.604302883 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:26.725223064 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:27.613878965 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:27.733982086 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:28.023629904 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:28.025141001 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:28.144985914 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:33.270169020 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:33.390075922 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:33.680033922 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:33.682516098 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:33.802273989 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:36.096592903 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:36.189834118 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:37.817238092 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:37.938021898 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:37.938085079 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:38.058763027 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:38.227034092 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:38.229933023 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:38.349910021 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:38.418977976 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:38.420603991 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:38.540363073 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.285732985 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:43.405705929 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.405957937 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:43.525729895 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.696326017 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.704189062 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:43.823995113 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.888448954 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:43.957241058 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:44.119843960 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:44.240210056 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:45.959484100 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:46.079230070 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:46.372474909 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:46.375024080 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:46.495085955 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:58.473726034 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:58.594867945 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:58.883826971 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:42:58.890883923 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:42:59.012016058 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:03.833288908 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:03.953114986 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.020193100 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:04.140280008 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.245042086 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.246700048 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:04.366609097 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.437499046 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.438813925 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:04.559252977 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:04.629434109 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:04.749583006 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:05.040102005 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:05.042164087 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:05.162108898 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:06.096582890 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:06.163345098 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:13.864017963 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:13.983808041 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:13.983876944 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:14.103694916 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.103750944 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:14.223606110 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.274398088 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.276671886 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:14.396787882 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.415537119 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.417227983 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:14.594500065 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.594512939 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.596236944 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:14.717488050 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.834542990 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:14.839915991 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:15.001737118 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:21.911428928 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:22.031172991 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:22.322407961 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:22.324502945 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:22.445055008 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:24.223189116 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:24.343092918 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:24.696129084 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:24.698239088 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:24.817955017 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.270145893 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:29.389885902 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.389955997 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:29.510421991 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.688528061 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.693242073 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:29.813028097 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.881428003 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:29.883677959 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:30.003360987 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:36.090598106 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:36.249016047 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:39.786422014 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:39.906135082 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:40.196613073 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:40.201443911 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:40.321149111 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:40.927972078 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:41.047799110 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:41.339454889 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:41.341753960 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:41.461779118 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:41.614613056 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:41.734411001 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:42.024594069 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:42.026532888 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:42.146543026 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:54.129905939 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:54.250108004 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:54.541105032 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:54.547027111 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:54.667028904 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:56.410813093 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:56.530689955 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:56.692152023 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:56.812201023 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:56.823146105 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:56.828046083 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:56.993850946 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:57.103007078 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:43:57.108010054 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:43:57.227807999 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:44:06.093313932 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:44:06.145068884 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:44:08.248128891 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:44:08.368556976 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:44:08.658761024 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Dec 5, 2024 19:44:08.659554958 CET | 49742 | 7000 | 192.168.2.4 | 185.196.8.239 |
Dec 5, 2024 19:44:08.779423952 CET | 7000 | 49742 | 185.196.8.239 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 5, 2024 19:40:01.839572906 CET | 52248 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 5, 2024 19:40:01.983913898 CET | 53 | 52248 | 1.1.1.1 | 192.168.2.4 |
Dec 5, 2024 19:40:33.712004900 CET | 49174 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 5, 2024 19:40:33.849917889 CET | 53 | 49174 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 5, 2024 19:40:01.839572906 CET | 192.168.2.4 | 1.1.1.1 | 0x7c33 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 5, 2024 19:40:33.712004900 CET | 192.168.2.4 | 1.1.1.1 | 0xed25 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 5, 2024 19:40:01.983913898 CET | 1.1.1.1 | 192.168.2.4 | 0x7c33 | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 5, 2024 19:40:33.849917889 CET | 1.1.1.1 | 192.168.2.4 | 0xed25 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 208.95.112.1 | 80 | 2852 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Dec 5, 2024 19:40:02.117707014 CET | 80 | OUT | |
Dec 5, 2024 19:40:03.304946899 CET | 175 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49740 | 149.154.167.220 | 443 | 2852 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-05 18:40:35 UTC | 447 | OUT | |
2024-12-05 18:40:35 UTC | 388 | IN | |
2024-12-05 18:40:35 UTC | 440 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 13:39:55 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc30000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 13:40:00 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x520000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 13:40:00 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 13:40:01 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 13:40:01 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\timeout.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2d0000 |
File size: | 25'088 bytes |
MD5 hash: | 976566BEEFCCA4A159ECBDB2D4B1A3E3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 13:40:03 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 13:40:03 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 13:40:08 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 13:40:08 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 13:40:13 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 13:40:13 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 13:40:14 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\AppData\Roaming\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 19 |
Start time: | 13:40:20 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 20 |
Start time: | 13:40:22 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfa0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 21 |
Start time: | 13:40:22 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 22 |
Start time: | 13:40:22 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\AppData\Roaming\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf0000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 24 |
Start time: | 13:40:28 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 25 |
Start time: | 13:40:32 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 26 |
Start time: | 13:40:32 |
Start date: | 05/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 27 |
Start time: | 13:40:33 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x360000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 29 |
Start time: | 13:40:39 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 30 |
Start time: | 13:40:41 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb60000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 31 |
Start time: | 13:40:47 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 32 |
Start time: | 13:40:47 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 33 |
Start time: | 13:40:49 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf30000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 35 |
Start time: | 13:40:55 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 37 |
Start time: | 13:42:00 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xcd0000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 39 |
Start time: | 13:42:06 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 40 |
Start time: | 13:43:00 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb30000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 42 |
Start time: | 13:43:06 |
Start date: | 05/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 43 |
Start time: | 13:44:00 |
Start date: | 05/12/2024 |
Path: | C:\Users\user\WindowsUpdaterConf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa80000 |
File size: | 3'507'712 bytes |
MD5 hash: | 7823E902900881094372948957825FE1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | false |
Execution Graph
Execution Coverage: | 16.1% |
Dynamic/Decrypted Code Coverage: | 97.5% |
Signature Coverage: | 6.6% |
Total number of Nodes: | 121 |
Total number of Limit Nodes: | 2 |
Graph
Function 06288C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031C8D58 Relevance: 7.0, Strings: 5, Instructions: 713COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287D68 Relevance: 7.0, Strings: 5, Instructions: 706COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C2E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C1BB8 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C4710 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C4720 Relevance: .3, Instructions: 284COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C2488 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06284DC3 Relevance: 3.9, Strings: 3, Instructions: 139COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C5111 Relevance: 1.6, APIs: 1, Instructions: 91threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C2E02 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C50E8 Relevance: 1.6, APIs: 1, Instructions: 65threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C5140 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C5298 Relevance: 1.6, APIs: 1, Instructions: 59memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031C8970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C52A0 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628BF50 Relevance: 1.5, Strings: 1, Instructions: 234COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031C8B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628FC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 062817FF Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06280ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06285043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06285134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06284B0B Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 062886F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06288780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06288760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06281A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 062876A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 062887F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06287A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06281A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031C0C60 Relevance: 2.7, Strings: 2, Instructions: 181COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031CEF90 Relevance: 2.7, Strings: 2, Instructions: 169COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031C0C70 Relevance: 2.7, Strings: 2, Instructions: 169COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061C1870 Relevance: 1.5, Strings: 1, Instructions: 238COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0628F400 Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031CD3E8 Relevance: .4, Instructions: 354COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 16.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 34 |
Total number of Limit Nodes: | 3 |
Graph
Function 011CB630 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011C69DC Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011CFC48 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011CFC50 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011CFDE9 Relevance: 1.6, APIs: 1, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 011CFDF0 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D2B4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D0EC Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D1D4 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D0E7 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D2AF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D1CF Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485B490 Relevance: 2.8, Strings: 2, Instructions: 252COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C3CE8 Relevance: 5.6, Strings: 4, Instructions: 577COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C24D8 Relevance: 4.2, Strings: 3, Instructions: 493COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04855AA0 Relevance: 1.4, Strings: 1, Instructions: 137COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04856FE0 Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AF98 Relevance: 1.3, Strings: 1, Instructions: 81COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DC88 Relevance: 1.3, Strings: 1, Instructions: 28COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DC98 Relevance: 1.3, Strings: 1, Instructions: 23COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04854638 Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048529F0 Relevance: .2, Instructions: 222COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857740 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485BAC0 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485BAB0 Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04856FB0 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04852B00 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C3CE1 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485C388 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04854843 Relevance: .1, Instructions: 100COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AE60 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AE70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AD28 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DFC0 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AD38 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DFD0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8F3D8 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048593F0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8F02C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04859400 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485767C Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8F3D3 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485E318 Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8F027 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04855D00 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485E328 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485BCE0 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485E2A0 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DE98 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485491C Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8D005 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485BF10 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857958 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8D9A7 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048590D8 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DE38 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00E8D998 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857968 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857697 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 048590E8 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DE48 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04859158 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04859542 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485896A Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DCD9 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04859168 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04858978 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04859550 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485DCE8 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485AF88 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485F868 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04858739 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04858800 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0485F878 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04858748 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04858810 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857932 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857EA0 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857940 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C3678 Relevance: 10.2, Strings: 8, Instructions: 192COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C0488 Relevance: 6.7, Strings: 5, Instructions: 485COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C1D80 Relevance: 6.5, Strings: 5, Instructions: 296COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857A21 Relevance: 5.2, Strings: 4, Instructions: 241COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04857A30 Relevance: 5.2, Strings: 4, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C5798 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076C0308 Relevance: 5.0, Strings: 4, Instructions: 48COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 6.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 3 |
Total number of Limit Nodes: | 0 |
Graph
Function 04C6B490 Relevance: 2.8, Strings: 2, Instructions: 252COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3CE8 Relevance: 5.6, Strings: 4, Instructions: 571COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE2308 Relevance: 4.4, Strings: 3, Instructions: 629COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08C5688F Relevance: 1.5, APIs: 1, Instructions: 48threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 08C56890 Relevance: 1.5, APIs: 1, Instructions: 48threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C66FC8 Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AF98 Relevance: 1.3, Strings: 1, Instructions: 81COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DC88 Relevance: 1.3, Strings: 1, Instructions: 31COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DC98 Relevance: 1.3, Strings: 1, Instructions: 23COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E7B8 Relevance: .3, Instructions: 254COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C629F0 Relevance: .2, Instructions: 207COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6BAB0 Relevance: .2, Instructions: 159COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67728 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6BAC0 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E419 Relevance: .1, Instructions: 139COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E428 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3CCC Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E610 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C62B00 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C66FA0 Relevance: .1, Instructions: 104COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6C388 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AE60 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AD28 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AE70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E640 Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DFC0 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AD38 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DFD0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332F3D8 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C693F0 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332F02C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C69400 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67664 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332F3D3 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332F027 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6BCE0 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E100 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DE98 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332D006 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6BF10 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67940 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332D8D3 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C690D8 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DE38 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0332D8C4 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C69158 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67950 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E7A8 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6767F Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C690E8 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DE48 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C69542 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DCD9 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6896A Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6E92E Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6AF88 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C69168 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C68978 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C69550 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6DCE8 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C68739 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C68800 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6F460 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6F470 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C68748 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C68810 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6791A Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6EA57 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67E90 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67928 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3928 Relevance: 12.8, Strings: 10, Instructions: 315COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6EBB8 Relevance: 10.2, Strings: 8, Instructions: 180COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C6EDE8 Relevance: 9.2, Strings: 7, Instructions: 453COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE1BE0 Relevance: 9.1, Strings: 7, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3678 Relevance: 8.9, Strings: 7, Instructions: 187COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE0488 Relevance: 6.7, Strings: 5, Instructions: 475COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C64CB0 Relevance: 6.4, Strings: 5, Instructions: 160COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67A09 Relevance: 5.2, Strings: 4, Instructions: 241COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04C67A18 Relevance: 5.2, Strings: 4, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE5798 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE0308 Relevance: 5.1, Strings: 4, Instructions: 60COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6B490 Relevance: 2.8, Strings: 2, Instructions: 252COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A3CE8 Relevance: 5.6, Strings: 4, Instructions: 582COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A2308 Relevance: 4.4, Strings: 3, Instructions: 649COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A66FE0 Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AF98 Relevance: 1.3, Strings: 1, Instructions: 82COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A629F0 Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BAC0 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67740 Relevance: .2, Instructions: 154COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BAB0 Relevance: .2, Instructions: 154COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A3CCE Relevance: .1, Instructions: 121COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A62B00 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6C388 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A66FD1 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AE60 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AD28 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AE70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A693F0 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BEA8 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AD38 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081F3D8 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081F02C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A69400 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6767C Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081F3D3 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081F027 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DD0F Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DD60 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BCE0 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DC98 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DF20 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BF10 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DEC1 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67958 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081D9A7 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081D01C Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A690D8 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A69158 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68969 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0081D998 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67968 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A690E8 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67697 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DED0 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A69168 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6AF88 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68800 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68978 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6F460 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A69550 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DD20 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6DD70 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68739 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A69549 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6F470 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68748 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A68810 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67932 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67EA0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67940 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6BD50 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A3928 Relevance: 12.8, Strings: 10, Instructions: 320COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6EC08 Relevance: 10.2, Strings: 8, Instructions: 162COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A6EDE8 Relevance: 9.2, Strings: 7, Instructions: 455COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A3678 Relevance: 8.9, Strings: 7, Instructions: 192COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67A21 Relevance: 5.2, Strings: 4, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00A67A30 Relevance: 5.2, Strings: 4, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A390A Relevance: 5.1, Strings: 4, Instructions: 95COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A5798 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072A030A Relevance: 5.0, Strings: 4, Instructions: 46COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 064D8C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D4DC3 Relevance: 3.9, Strings: 3, Instructions: 140COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06412E02 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06412E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 032F8970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DBF50 Relevance: 1.5, Strings: 1, Instructions: 237COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 032F8B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DFC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D17FF Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DFB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D0ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D5043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D5134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064DBF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D86F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D8760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D76A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D87F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D7A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 064D1A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 5.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0% |
Total number of Nodes: | 3 |
Total number of Limit Nodes: | 0 |
Graph
Function 00BBB488 Relevance: .3, Instructions: 256COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBB498 Relevance: .3, Instructions: 252COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07242700 Relevance: 22.5, Strings: 17, Instructions: 1223COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07243CE8 Relevance: 5.6, Strings: 4, Instructions: 588COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072417B8 Relevance: 2.8, Strings: 2, Instructions: 332COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 081D785B Relevance: 1.6, APIs: 1, Instructions: 50threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 081D7860 Relevance: 1.5, APIs: 1, Instructions: 48threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB6FC8 Relevance: 1.4, Strings: 1, Instructions: 114COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAFA0 Relevance: 1.3, Strings: 1, Instructions: 81COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB29F0 Relevance: .2, Instructions: 210COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBBAB8 Relevance: .2, Instructions: 158COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7728 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBBAC8 Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07243CCC Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB2B00 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB6FA0 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC390 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAE68 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAD30 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAE78 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB93F8 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 072426FA Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAD40 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1F3D8 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1F02C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB9408 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7664 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC340 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBE438 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1F3D3 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1F027 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBE448 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBBCE8 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBF590 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1D006 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7940 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBBF18 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDE81 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1D9A7 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC4C8 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB90E0 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBCB62 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B1D998 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB9549 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7950 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDFE0 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC4D8 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB90F0 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB767F Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8969 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDFF0 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB9160 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDE30 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBCB78 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB9170 Relevance: .0, Instructions: 25COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8978 Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB9558 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDE90 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBDE40 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBAF90 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBF608 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC990 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8800 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8739 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBC9A0 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBF618 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8748 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB8810 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7E90 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7920 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7928 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07243928 Relevance: 12.8, Strings: 10, Instructions: 324COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07241BE0 Relevance: 11.7, Strings: 9, Instructions: 442COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07240FB2 Relevance: 11.4, Strings: 9, Instructions: 187COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BBECD8 Relevance: 10.1, Strings: 8, Instructions: 146COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07243678 Relevance: 8.9, Strings: 7, Instructions: 188COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07240488 Relevance: 6.7, Strings: 5, Instructions: 495COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7A09 Relevance: 5.2, Strings: 4, Instructions: 242COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7A18 Relevance: 5.2, Strings: 4, Instructions: 234COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7218 Relevance: 5.2, Strings: 4, Instructions: 189COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07245798 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07240308 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 05748C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05744DC3 Relevance: 2.6, Strings: 2, Instructions: 139COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0574BF50 Relevance: 1.6, Strings: 1, Instructions: 396COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05682E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05682E02 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D78970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D78B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0574FC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05747B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 057417FF Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0574FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05740ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05745043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0574504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05747D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05745134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0574BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 057486F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05748780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05741A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05748760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 057476A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 057487F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05747310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05747680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05747A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05741A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 6.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 05998C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05994DC3 Relevance: 2.6, Strings: 2, Instructions: 143COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 058D2E03 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 058D2E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EE8970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0599BF50 Relevance: 1.5, Strings: 1, Instructions: 237COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05997B70 Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EE8B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0599FC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 059917FF Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0599FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05990ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0599504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05995043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05997D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05995134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05994B0B Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0599BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 059986F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05998780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05998760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 059976A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05991A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 059987F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05997310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05997680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05997A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05991A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 06198C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06194DC3 Relevance: 3.9, Strings: 3, Instructions: 139COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 060D2E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 060D2E03 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01728970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0619BF50 Relevance: 1.5, Strings: 1, Instructions: 234COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01728B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0619FC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06197B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061917FF Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0619FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06190ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0619504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06195043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06197D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06195134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0619BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061986F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06198780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06198760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06191A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061976A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 061987F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06197310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06197680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06197A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06191A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 8.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 06568C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06564DC3 Relevance: 3.9, Strings: 3, Instructions: 140COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02392E00 Relevance: 1.6, APIs: 1, Instructions: 67COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02392E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01948970 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0656BF50 Relevance: 1.5, Strings: 1, Instructions: 232COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01948B40 Relevance: 1.3, APIs: 1, Instructions: 49COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0656FC10 Relevance: .2, Instructions: 166COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06567B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 065617FF Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0656FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06560ACB Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06565043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0656504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06567D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06565134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0656BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 065686F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06568780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06561A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06568760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 065676A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 065687F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06567310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06567680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06567A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06561A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 24 |
Total number of Limit Nodes: | 0 |
Graph
Function 06308C18 Relevance: 11.3, Strings: 7, Instructions: 2546COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06242E02 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06242E08 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0630BF50 Relevance: 1.5, Strings: 1, Instructions: 232COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0630FC10 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06307B70 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0630FB20 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06305043 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0630504F Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06307D28 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06305134 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0630BF28 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 063086F0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06308780 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06308760 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06301A64 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 063076A0 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 063087F0 Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06307310 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06307680 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06307A70 Relevance: .0, Instructions: 5COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06301A17 Relevance: .0, Instructions: 4COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|