Windows
Analysis Report
uctgkfb7.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- uctgkfb7.exe (PID: 7724 cmdline:
"C:\Users\ user\Deskt op\uctgkfb 7.exe" MD5: 775F4C7210DF898B94567787F91821F8) - schtasks.exe (PID: 7864 cmdline:
"C:\Window s\System32 \schtasks. exe" /crea te /f /RL HIGHEST /s c minute / mo 1 /tn " Windows" / tr "C:\Use rs\user\Wi ndows.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 7872 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- Windows.exe (PID: 7976 cmdline:
C:\Users\u ser\Window s.exe MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 8128 cmdline:
"C:\Users\ user\Windo ws.exe" MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 5948 cmdline:
"C:\Users\ user\Windo ws.exe" MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 2472 cmdline:
C:\Users\u ser\Window s.exe MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 3068 cmdline:
C:\Users\u ser\Window s.exe MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 6100 cmdline:
C:\Users\u ser\Window s.exe MD5: 775F4C7210DF898B94567787F91821F8)
- Windows.exe (PID: 5652 cmdline:
C:\Users\u ser\Window s.exe MD5: 775F4C7210DF898B94567787F91821F8)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["rondtimes.top"], "Port": 1940, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
System Summary |
---|
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T12:37:13.739297+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.10 | 49981 | 192.210.175.202 | 1940 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_00007FF7C0E273F6 | |
Source: | Code function: | 0_2_00007FF7C0E281A2 | |
Source: | Code function: | 0_2_00007FF7C0E21291 | |
Source: | Code function: | 0_2_00007FF7C0E21B99 | |
Source: | Code function: | 0_2_00007FF7C0E20E3A | |
Source: | Code function: | 4_2_00007FF7C0E3128C | |
Source: | Code function: | 4_2_00007FF7C0E30DFA | |
Source: | Code function: | 4_2_00007FF7C0E31B99 | |
Source: | Code function: | 6_2_00007FF7C0E50DFA | |
Source: | Code function: | 6_2_00007FF7C0E51058 | |
Source: | Code function: | 6_2_00007FF7C0E51B99 | |
Source: | Code function: | 7_2_00007FF7C0E40DFA | |
Source: | Code function: | 7_2_00007FF7C0E41058 | |
Source: | Code function: | 7_2_00007FF7C0E41B99 | |
Source: | Code function: | 8_2_00007FF7C0E3128C | |
Source: | Code function: | 8_2_00007FF7C0E30DFA | |
Source: | Code function: | 8_2_00007FF7C0E31B99 | |
Source: | Code function: | 11_2_00007FF7C0E3128C | |
Source: | Code function: | 11_2_00007FF7C0E30DFA | |
Source: | Code function: | 11_2_00007FF7C0E31B99 | |
Source: | Code function: | 13_2_00007FF7C0E60DFA | |
Source: | Code function: | 13_2_00007FF7C0E61058 | |
Source: | Code function: | 13_2_00007FF7C0E61B99 | |
Source: | Code function: | 14_2_00007FF7C0E60DFA | |
Source: | Code function: | 14_2_00007FF7C0E61058 | |
Source: | Code function: | 14_2_00007FF7C0E61B99 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: | ||
Source: | Base64 encoded string: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 6_2_00007FF7C0E500C1 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | File created: | Jump to dropped file |
Source: | Process created: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 1 Scheduled Task/Job | 12 Process Injection | 111 Masquerading | OS Credential Dumping | 221 Security Software Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 21 Registry Run Keys / Startup Folder | 1 Scheduled Task/Job | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 1 DLL Side-Loading | 21 Registry Run Keys / Startup Folder | 131 Virtualization/Sandbox Evasion | Security Account Manager | 131 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 11 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 12 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Obfuscated Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML | |||
84% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
rondtimes.top | 192.210.175.202 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.210.175.202 | rondtimes.top | United States | 36352 | AS-COLOCROSSINGUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577363 |
Start date and time: | 2024-12-18 12:32:19 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 16s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 15 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | uctgkfb7.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@11/3@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 20.12.23.50
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Windows.exe, PID 2472 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 3068 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 5652 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 5948 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 6100 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 7976 because it is empty
- Execution Graph export aborted for target Windows.exe, PID 8128 because it is empty
- Execution Graph export aborted for target uctgkfb7.exe, PID 7724 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: uctgkfb7.exe
Time | Type | Description |
---|---|---|
06:33:17 | API Interceptor | |
12:33:18 | Task Scheduler | |
12:33:21 | Autostart | |
12:33:29 | Autostart | |
12:33:37 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AS-COLOCROSSINGUS | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Cobalt Strike, FormBook | Browse |
| ||
Get hash | malicious | WSHRat, Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Cobalt Strike, Remcos | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Windows.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.380476433908377 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT |
MD5: | 30E4BDFC34907D0E4D11152CAEBE27FA |
SHA1: | 825402D6B151041BA01C5117387228EC9B7168BF |
SHA-256: | A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63 |
SHA-512: | 89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk
Download File
Process: | C:\Users\user\Desktop\uctgkfb7.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 772 |
Entropy (8bit): | 5.084361151518897 |
Encrypted: | false |
SSDEEP: | 12:8al8/4hmoHrJC5Ur5MjA+3lK7bW+1gUNwuLA7l244t2YZ/elFlSJmkmV:8qZHrJl5IAKK76+17g52wqygm |
MD5: | 5149D0AE75234048665F76235B620D12 |
SHA1: | C8BAC7CD455B5707C3ABA44BE1DF6D911C511F03 |
SHA-256: | 49E573B19880EFFC377F9BAE7E2168C459D6C28248C49E015352CFBB9D541A3B |
SHA-512: | 274C7EE73C0BF3FE843525B62C01A10DC889CA6C4F4498A05B1B3CEE5A90EC4E88E8605E9D3A25D25A9F472ABBAABDBF363516311B4A756E54460B2AF0AFEA22 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\uctgkfb7.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 57856 |
Entropy (8bit): | 5.934885873938917 |
Encrypted: | false |
SSDEEP: | 1536:MUQ5SkVGKOuZFlPvHgnAb1587R9OX+qOPc:MUQncKOO3gnAb15qEX+qOPc |
MD5: | 775F4C7210DF898B94567787F91821F8 |
SHA1: | 3B07503249AE0460CA0CB8CD892CA0A9FE6DA2BF |
SHA-256: | 1733612A98EDF009C2B9154063A21DE71129BA2A5574F7A1DF6F82CE4111AE9F |
SHA-512: | A093486792FF12D6511BC03329909C6CC3B52E8FE2E0B556641F6025E89C8FCA794DB8CCBE8E1B65AB4016155AAA9FCD0CF40F82682CE2DE9FC9FEE370C185F0 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.934885873938917 |
TrID: |
|
File name: | uctgkfb7.exe |
File size: | 57'856 bytes |
MD5: | 775f4c7210df898b94567787f91821f8 |
SHA1: | 3b07503249ae0460ca0cb8cd892ca0a9fe6da2bf |
SHA256: | 1733612a98edf009c2b9154063a21de71129ba2a5574f7a1df6f82ce4111ae9f |
SHA512: | a093486792ff12d6511bc03329909c6cc3b52e8fe2e0b556641f6025e89c8fca794db8ccbe8e1b65ab4016155aaa9fcd0cf40f82682ce2de9fc9fee370c185f0 |
SSDEEP: | 1536:MUQ5SkVGKOuZFlPvHgnAb1587R9OX+qOPc:MUQncKOO3gnAb15qEX+qOPc |
TLSH: | A8437D5877E68226E2FE5FF669F27063C679F1231C03965F24D9008B5B23A85CD807E6 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g................................. ........@.. .......................@............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40f6ae |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x672EA093 [Fri Nov 8 23:36:51 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xf660 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x10000 | 0x4d6 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x12000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xd6b4 | 0xd800 | 6e03debce771a7b7d8129b0f81b3ce67 | False | 0.6013093171296297 | data | 6.031154093365925 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x10000 | 0x4d6 | 0x600 | db200c354f643d7e877dc5314be85f80 | False | 0.3743489583333333 | data | 3.718671543928007 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12000 | 0xc | 0x200 | f9e5d10342c566ee6175dd6e4817b9e5 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x100a0 | 0x24c | data | 0.4710884353741497 | ||
RT_MANIFEST | 0x102ec | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T12:33:32.487800+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.10 | 49708 | 192.210.175.202 | 1940 | TCP |
2024-12-18T12:37:13.739297+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.10 | 49981 | 192.210.175.202 | 1940 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:33:18.516278982 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:18.674179077 CET | 1940 | 49708 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:18.674276114 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:18.841059923 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:19.025693893 CET | 1940 | 49708 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:32.487799883 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:32.608067989 CET | 1940 | 49708 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:40.584327936 CET | 1940 | 49708 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:40.584395885 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:40.816623926 CET | 49708 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:40.818386078 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:40.936249018 CET | 1940 | 49708 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:40.938390017 CET | 1940 | 49762 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:40.938668966 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:40.996279955 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:41.116102934 CET | 1940 | 49762 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:33:54.535752058 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:33:54.655379057 CET | 1940 | 49762 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:02.834434032 CET | 1940 | 49762 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:02.837038994 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:03.895502090 CET | 49762 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:03.897286892 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:04.015094042 CET | 1940 | 49762 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:04.016801119 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:04.016968966 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:04.056303978 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:04.175957918 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:14.082794905 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:14.202301979 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:22.863609076 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:22.983226061 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:24.271918058 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:24.475975990 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:25.928569078 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:25.928642988 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:26.379753113 CET | 49814 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:26.381042957 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:26.499356031 CET | 1940 | 49814 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:26.500562906 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:26.500715017 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:26.609966040 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:26.729631901 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:31.957432032 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:32.076971054 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:32.079905987 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:32.199390888 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:32.287756920 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:32.407380104 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:32.407764912 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:32.527357101 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:37.411262989 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:37.530894995 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:37.530953884 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:37.651122093 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:40.725850105 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:40.845383883 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:44.785536051 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:44.907387972 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:47.348050117 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:47.467544079 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:48.413420916 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:48.413506985 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:52.597790956 CET | 49865 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:52.601568937 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:52.717420101 CET | 1940 | 49865 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:52.721115112 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:52.721209049 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:52.766812086 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:52.886773109 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:52.895453930 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:53.015095949 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:53.015153885 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:53.134645939 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:53.134767056 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:53.254241943 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:57.957457066 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:58.077088118 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:34:58.144990921 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:34:58.265708923 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:05.302542925 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:05.422152996 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:08.333096027 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:08.452820063 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:08.520183086 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:08.640043974 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:08.640095949 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:08.759826899 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:08.863809109 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:08.983546019 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:11.692024946 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:11.811788082 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:14.664973021 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:14.665038109 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:18.895103931 CET | 49924 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:18.897193909 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:19.014672041 CET | 1940 | 49924 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:19.017066956 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:19.017160892 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:19.063384056 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:19.183037043 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:19.223848104 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:19.343609095 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:22.801445007 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:22.921175003 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:24.395212889 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:24.514869928 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:24.514944077 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:24.637984037 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:34.348355055 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:34.467961073 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:34.723275900 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:34.842958927 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:34.843205929 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:34.962666035 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:38.582730055 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:38.702342033 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:40.898650885 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:40.898721933 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:44.910577059 CET | 49977 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:44.925688028 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:45.030231953 CET | 1940 | 49977 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:45.045233965 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:45.045329094 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:45.082071066 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:45.201917887 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:45.203973055 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:45.323714018 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:45.426330090 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:45.545768023 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:47.755889893 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:47.875529051 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:48.863224983 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:49.002525091 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:50.160809994 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:50.280322075 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:50.280396938 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:50.400069952 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:35:50.400170088 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:35:50.520003080 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:01.410813093 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:01.530592918 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:06.930375099 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:06.930437088 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.035868883 CET | 49978 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.040924072 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.155363083 CET | 1940 | 49978 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:11.160393000 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:11.160459042 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.194926023 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.314460993 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:11.314573050 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.434061050 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:11.434134007 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.553705931 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:11.553774118 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:11.673501015 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:16.551403046 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:16.670989037 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:20.083101988 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:20.203181028 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:23.926609993 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:24.048507929 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:25.473160982 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:25.593741894 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:26.613934994 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:26.733575106 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:26.738806963 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:26.858347893 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:26.858412981 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:26.978018045 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:26.978095055 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:27.097621918 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:32.020153046 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:32.140520096 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:32.140656948 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:32.260813951 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:33.118769884 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:33.118849993 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.129396915 CET | 49979 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.132626057 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.250324011 CET | 1940 | 49979 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:37.252748013 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:37.256155968 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.400403023 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.520262957 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:37.522439003 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:37.642152071 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:42.739022970 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:42.858596087 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:42.858648062 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:42.978473902 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:47.832891941 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:47.952472925 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:50.301457882 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:50.421282053 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:51.428004026 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:51.547671080 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:52.348718882 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:52.468203068 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:52.989208937 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:53.108943939 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:53.109030008 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:36:53.228763103 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:59.150177002 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:36:59.150264978 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:03.160573959 CET | 49980 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:03.163063049 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:03.299370050 CET | 1940 | 49980 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:03.299420118 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:03.299866915 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:03.409104109 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:03.528611898 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:03.926393986 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:04.045896053 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:08.504868031 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:08.624602079 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:09.523094893 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:09.642859936 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:13.739296913 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:13.859095097 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:14.504595995 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:14.624218941 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:16.426526070 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:16.546892881 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:16.942257881 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:17.061958075 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:25.197834015 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:25.197937012 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:28.785890102 CET | 49981 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:28.787003040 CET | 49982 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:28.905728102 CET | 1940 | 49981 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:28.906615973 CET | 1940 | 49982 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:28.906833887 CET | 49982 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:28.934376955 CET | 49982 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:29.054390907 CET | 1940 | 49982 | 192.210.175.202 | 192.168.2.10 |
Dec 18, 2024 12:37:39.754672050 CET | 49982 | 1940 | 192.168.2.10 | 192.210.175.202 |
Dec 18, 2024 12:37:39.874404907 CET | 1940 | 49982 | 192.210.175.202 | 192.168.2.10 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 12:33:18.063843012 CET | 52065 | 53 | 192.168.2.10 | 1.1.1.1 |
Dec 18, 2024 12:33:18.489492893 CET | 53 | 52065 | 1.1.1.1 | 192.168.2.10 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:33:18.063843012 CET | 192.168.2.10 | 1.1.1.1 | 0xec79 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 12:33:18.489492893 CET | 1.1.1.1 | 192.168.2.10 | 0xec79 | No error (0) | 192.210.175.202 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:33:11 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\uctgkfb7.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x9f0000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 2 |
Start time: | 06:33:16 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff666160000 |
File size: | 235'008 bytes |
MD5 hash: | 76CD6626DD8834BD4A42E6A565104DC2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 06:33:16 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff620390000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 06:33:18 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xc10000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:33:29 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xaa0000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 7 |
Start time: | 06:33:37 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xfc0000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 8 |
Start time: | 06:34:01 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xcc0000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 06:35:00 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x5c0000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 13 |
Start time: | 06:36:01 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x280000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 14 |
Start time: | 06:37:00 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Windows.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x260000 |
File size: | 57'856 bytes |
MD5 hash: | 775F4C7210DF898B94567787F91821F8 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E273F6 Relevance: .5, Instructions: 488COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E281A2 Relevance: .5, Instructions: 463COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E21B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20DB8 Relevance: .4, Instructions: 350COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E27DB6 Relevance: .3, Instructions: 345COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E2341F Relevance: .3, Instructions: 321COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E23805 Relevance: .3, Instructions: 254COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E2954D Relevance: .2, Instructions: 249COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E217C7 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20DC0 Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E295A0 Relevance: .2, Instructions: 225COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E28B5D Relevance: .2, Instructions: 214COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E29B3A Relevance: .2, Instructions: 195COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E24901 Relevance: .2, Instructions: 181COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20DE0 Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20608 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20BEE Relevance: .2, Instructions: 154COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20E20 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E28EC1 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20DB0 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20DE5 Relevance: .1, Instructions: 119COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E28D89 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E25470 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E298E1 Relevance: .1, Instructions: 90COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E21155 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E23AF5 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20AA0 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E29D11 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E28900 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E221E0 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E29E69 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E21DC1 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E21D6B Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E22A41 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E294A0 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E22751 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E29D01 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E228A1 Relevance: .0, Instructions: 6COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E20E3A Relevance: .2, Instructions: 246COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3128C Relevance: .7, Instructions: 721COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31065 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E310D0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30BEE Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30A89 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3116C Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D51 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D6C Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51058 Relevance: .7, Instructions: 668COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50DFA Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51060 Relevance: .5, Instructions: 499COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51239 Relevance: .4, Instructions: 424COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50BEE Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E510D0 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50A89 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51168 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E51D51 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E50B67 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41058 Relevance: .7, Instructions: 668COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40DFA Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41060 Relevance: .5, Instructions: 499COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41239 Relevance: .4, Instructions: 424COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40BEE Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E410D0 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40A89 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41168 Relevance: .1, Instructions: 79COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E41D51 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E40B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3128C Relevance: .7, Instructions: 721COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31065 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E310D0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30BEE Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30A89 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3116C Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D51 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D6C Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3128C Relevance: .7, Instructions: 721COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31B99 Relevance: .2, Instructions: 194COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31065 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E310D0 Relevance: .2, Instructions: 183COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30BEE Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30528 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30A89 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E3116C Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D51 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E31D6C Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E30B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61058 Relevance: .7, Instructions: 668COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60DFA Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61B99 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61060 Relevance: .5, Instructions: 499COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61239 Relevance: .4, Instructions: 424COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60BEE Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60528 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E610D0 Relevance: .1, Instructions: 97COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60A89 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61168 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61D51 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61058 Relevance: .7, Instructions: 668COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60DFA Relevance: .3, Instructions: 273COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61B99 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61060 Relevance: .5, Instructions: 499COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61239 Relevance: .4, Instructions: 424COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60BEE Relevance: .2, Instructions: 179COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60528 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60949 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E610D0 Relevance: .1, Instructions: 97COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60A89 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61168 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E61D51 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FF7C0E60B68 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|