Windows
Analysis Report
9mauyKC3JW.exe
Overview
General Information
Sample name: | 9mauyKC3JW.exerenamed because original name is a hash value |
Original sample name: | ae130c89b7d8c4c9fd06422faeb79fc9.exe |
Analysis ID: | 1581191 |
MD5: | ae130c89b7d8c4c9fd06422faeb79fc9 |
SHA1: | b5fdcc9e63448dd0f68b75b7bf54ff3fef94623c |
SHA256: | b13a4e5207954eaeb6aaf32e333a4f366a86afc0779406c9bf17805d5b83e2e9 |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 9mauyKC3JW.exe (PID: 7820 cmdline:
"C:\Users\ user\Deskt op\9mauyKC 3JW.exe" MD5: AE130C89B7D8C4C9FD06422FAEB79FC9) - hv.exe (PID: 7940 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\hv.exe " MD5: 480F8CF600F5509595B8418C6534CAF2) - hv.exe (PID: 7960 cmdline:
C:\Users\u ser\AppDat a\Roaming\ Chromewiza rd\hv.exe MD5: 480F8CF600F5509595B8418C6534CAF2) - cmd.exe (PID: 7996 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 8004 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Localdockerv3.exe (PID: 1296 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Localdo ckerv3.exe MD5: 967F4470627F823F4D7981E511C9824F)
- hv.exe (PID: 1612 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Chromewiz ard\hv.exe " MD5: 480F8CF600F5509595B8418C6534CAF2) - cmd.exe (PID: 3344 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 1868 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- hv.exe (PID: 3324 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Chromewiz ard\hv.exe " MD5: 480F8CF600F5509595B8418C6534CAF2) - cmd.exe (PID: 2940 cmdline:
C:\Windows \SysWOW64\ cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2884 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Localdockerv3.exe (PID: 4080 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\Localdo ckerv3.exe MD5: 967F4470627F823F4D7981E511C9824F)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM | Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) | ditekSHen |
| |
JoeSecurity_UACBypassusingCMSTP | Yara detected UAC Bypass using CMSTP | Joe Security | ||
Click to see the 11 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T08:15:52.621984+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49711 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:15:55.284043+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49713 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:15:57.338216+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49714 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:05.356520+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49716 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:08.819571+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49717 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:10.842099+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49718 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:12.781810+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49719 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:14.704165+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49720 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:17.109798+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49721 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:19.577127+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49722 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:23.630281+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.8 | 49723 | 172.67.153.243 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T08:15:53.549685+0100 | 2056550 | 1 | A Network Trojan was detected | 192.168.2.8 | 49711 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:24.333173+0100 | 2056550 | 1 | A Network Trojan was detected | 192.168.2.8 | 49723 | 172.67.153.243 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | ||
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: | ||
Source: | Joe Sandbox ML: |
Exploits |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_0040301A | |
Source: | Code function: | 0_2_00402B79 |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00404FAA | |
Source: | Code function: | 0_2_0041206B | |
Source: | Code function: | 0_2_0041022D | |
Source: | Code function: | 0_2_00411F91 | |
Source: | Code function: | 2_2_6CAF8856 | |
Source: | Code function: | 2_2_6CBD2860 | |
Source: | Code function: | 2_2_6CBD51C0 | |
Source: | Code function: | 2_2_6CBCE530 | |
Source: | Code function: | 2_2_6CBCDD30 | |
Source: | Code function: | 2_2_6CBD4AD0 | |
Source: | Code function: | 2_2_6CBCE610 | |
Source: | Code function: | 2_2_6CBF0670 | |
Source: | Code function: | 2_2_6CBD1E50 | |
Source: | Code function: | 2_2_6CBD4A40 | |
Source: | Code function: | 2_2_6CBD2330 | |
Source: | Code function: | 2_2_6CBD2730 | |
Source: | Code function: | 2_2_6CBD1770 | |
Source: | Code function: | 2_2_6CBCD760 | |
Source: | Code function: | 3_2_6C3BD400 | |
Source: | Code function: | 3_2_6C3B2860 | |
Source: | Code function: | 3_2_6C3BD4E0 | |
Source: | Code function: | 3_2_6C3ADD30 | |
Source: | Code function: | 3_2_6C3AE530 | |
Source: | Code function: | 3_2_6C3B51C0 | |
Source: | Code function: | 3_2_6C3AE610 | |
Source: | Code function: | 3_2_6C3B1E50 | |
Source: | Code function: | 3_2_6C3B4A40 | |
Source: | Code function: | 3_2_6C3B3AB0 | |
Source: | Code function: | 3_2_6C3B4AD0 | |
Source: | Code function: | 3_2_6C3B32C0 | |
Source: | Code function: | 3_2_6C3B2730 | |
Source: | Code function: | 3_2_6C3B2330 | |
Source: | Code function: | 3_2_6C3B1770 | |
Source: | Code function: | 3_2_6C3AD760 | |
Source: | Code function: | 8_2_000000014000BFFC | |
Source: | Code function: | 8_2_000000014001D000 | |
Source: | Code function: | 8_2_0000000140001424 | |
Source: | Code function: | 8_2_000000014000B824 | |
Source: | Code function: | 8_2_000000014002F838 | |
Source: | Code function: | 8_2_0000000140008C3C | |
Source: | Code function: | 8_2_000000014000D848 | |
Source: | Code function: | 8_2_0000000140005450 | |
Source: | Code function: | 8_2_000000014000D458 | |
Source: | Code function: | 8_2_0000000140021068 | |
Source: | Code function: | 8_2_000000014001048C | |
Source: | Code function: | 8_2_000000014000909C | |
Source: | Code function: | 8_2_00000001400EE4C4 | |
Source: | Code function: | 8_2_00000001400238F8 | |
Source: | Code function: | 8_2_000000014001A9B8 | |
Source: | Code function: | 8_2_00000001400041C8 | |
Source: | Code function: | 8_2_00000001400231CC | |
Source: | Code function: | 8_2_000000014000A5E0 | |
Source: | Code function: | 8_2_0000000140021A00 | |
Source: | Code function: | 8_2_000000014000E214 | |
Source: | Code function: | 8_2_0000000140022E30 | |
Source: | Code function: | 8_2_0000000140024A78 | |
Source: | Code function: | 8_2_000000014002267C | |
Source: | Code function: | 8_2_000000014001AE88 | |
Source: | Code function: | 8_2_000000014001F2A4 | |
Source: | Code function: | 8_2_0000000140011EF4 | |
Source: | Code function: | 8_2_000000014001DF44 | |
Source: | Code function: | 8_2_0000000140040F48 | |
Source: | Code function: | 8_2_000000014000A378 | |
Source: | Code function: | 8_2_0000000140013390 | |
Source: | Code function: | 8_2_0000000140018790 | |
Source: | Code function: | 8_2_0000000140020BB8 | |
Source: | Code function: | 9_2_6C452860 | |
Source: | Code function: | 9_2_6C45D400 | |
Source: | Code function: | 9_2_6C45D4E0 | |
Source: | Code function: | 9_2_6C44DD30 | |
Source: | Code function: | 9_2_6C44E530 | |
Source: | Code function: | 9_2_6C4551C0 | |
Source: | Code function: | 9_2_6C454A40 | |
Source: | Code function: | 9_2_6C451E50 | |
Source: | Code function: | 9_2_6C44E610 | |
Source: | Code function: | 9_2_6C4532C0 | |
Source: | Code function: | 9_2_6C454AD0 | |
Source: | Code function: | 9_2_6C453AB0 | |
Source: | Code function: | 9_2_6C44D760 | |
Source: | Code function: | 9_2_6C451770 | |
Source: | Code function: | 9_2_6C452730 | |
Source: | Code function: | 9_2_6C452330 | |
Source: | Code function: | 15_2_6BE6D760 | |
Source: | Code function: | 15_2_6BE71770 | |
Source: | Code function: | 15_2_6BE72730 | |
Source: | Code function: | 15_2_6BE72330 | |
Source: | Code function: | 15_2_6BE732C0 | |
Source: | Code function: | 15_2_6BE74AD0 | |
Source: | Code function: | 15_2_6BE73AB0 | |
Source: | Code function: | 15_2_6BE74A40 | |
Source: | Code function: | 15_2_6BE71E50 | |
Source: | Code function: | 15_2_6BE6E610 | |
Source: | Code function: | 15_2_6BE751C0 | |
Source: | Code function: | 15_2_6BE6DD30 | |
Source: | Code function: | 15_2_6BE6E530 | |
Source: | Code function: | 15_2_6BE7D4E0 | |
Source: | Code function: | 15_2_6BE72860 | |
Source: | Code function: | 15_2_6BFCD420 | |
Source: | Code function: | 15_2_6BE7D400 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_00407776 |
Source: | Code function: | 0_2_0040118A |
Source: | Code function: | 0_2_004034C1 |
Source: | Code function: | 0_2_00401BDF |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | Window found: | Jump to behavior |
Source: | File opened: |
Source: | Window detected: |
Source: | Key opened: | Jump to behavior |
Source: | Static file information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_00406D5D |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00411C4E | |
Source: | Code function: | 2_2_6CD2C58E | |
Source: | Code function: | 8_2_0000000140012832 | |
Source: | Code function: | 8_2_000000014001D94B | |
Source: | Code function: | 8_2_0000000140013D4D | |
Source: | Code function: | 8_2_0000000140013DE6 | |
Source: | Code function: | 8_2_0000000140013F27 |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Module Loaded: | ||
Source: | Module Loaded: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file | ||
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_0040301A | |
Source: | Code function: | 0_2_00402B79 |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 2_2_6CD4A7D6 |
Source: | Code function: | 0_2_00406D5D |
Source: | Code function: | 2_2_6CAF7104 | |
Source: | Code function: | 3_2_6C2D7104 | |
Source: | Code function: | 9_2_6C377104 | |
Source: | Code function: | 15_2_6BD97104 |
Source: | Code function: | 2_2_6CD4A7D6 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtRequestWaitReplyPort: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtReadFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationToken: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtEnumerateValueKey: | Jump to behavior | ||
Source: | NtSetInformationProcess: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtOpenFile: | Jump to behavior | ||
Source: | NtCreateThreadEx: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtQueryInformationToken: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtDeviceIoControlFile: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtReadVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtCreateThreadEx: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtQuerySystemInformation: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQueryInformationToken: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtQueryValueKey: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationProcess: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtSetInformationThread: | Jump to behavior | ||
Source: | NtOpenKeyEx: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtQueryInformationProcess: | Jump to behavior | ||
Source: | NtReadFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtClose: | |||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtProtectVirtualMemory: | Jump to behavior | ||
Source: | NtCreateFile: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior | ||
Source: | NtAllocateVirtualMemory: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Code function: | 0_2_0040D72E |
Source: | Code function: | 0_2_00401F9D |
Source: | Key value queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00401626 |
Source: | Code function: | 0_2_00404FAA |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 11 DLL Side-Loading | 212 Process Injection | 11 Masquerading | 1 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 Abuse Elevation Control Mechanism | 1 Virtualization/Sandbox Evasion | 1 Credentials in Registry | 211 Security Software Discovery | Remote Desktop Protocol | 21 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 11 DLL Side-Loading | 212 Process Injection | Security Account Manager | 1 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 2 Process Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Abuse Elevation Control Mechanism | LSA Secrets | 13 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | 146 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 11 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | Virustotal | Browse | ||
42% | ReversingLabs | Win32.Trojan.Nekark |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
100% | Joe Sandbox ML | |||
0% | ReversingLabs | |||
0% | ReversingLabs | |||
39% | ReversingLabs | Win32.Trojan.Generic | ||
0% | ReversingLabs | |||
39% | ReversingLabs | Win32.Trojan.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
digoperonodice3.online | 172.67.153.243 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.153.243 | digoperonodice3.online | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581191 |
Start date and time: | 2024-12-27 08:14:09 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 11s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 21 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 1 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 9mauyKC3JW.exerenamed because original name is a hash value |
Original Sample Name: | ae130c89b7d8c4c9fd06422faeb79fc9.exe |
Detection: | MAL |
Classification: | mal100.spyw.expl.evad.winEXE@20/23@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Localdockerv3.exe, PID 1296 because there are no executed function
- Execution Graph export aborted for target hv.exe, PID 1612 because there are no executed function
- Execution Graph export aborted for target hv.exe, PID 3324 because there are no executed function
- Execution Graph export aborted for target hv.exe, PID 7960 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report creation exceeded maximum time and may have missing disassembly code information.
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenFile calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryAttributesFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
02:15:40 | API Interceptor | |
02:15:42 | API Interceptor | |
08:15:29 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Gozi, Ursnif | Browse |
| ||
Get hash | malicious | NetSupport RAT, LummaC, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\Localdockerv3.exe | Get hash | malicious | Unknown | Browse | ||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | DarkVision Rat | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5685791 |
Entropy (8bit): | 7.735296092306856 |
Encrypted: | false |
SSDEEP: | 98304:fRvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:JbdaVTEGcwqO10bLy |
MD5: | E3ECD9A2BF9E44E13947243CA501197B |
SHA1: | 394138DBC559F794B6FB79E6B3CF78D015EB9920 |
SHA-256: | 52A3FD13CE124C07926A84F0D3F73CEDF4F11BD20A2672CC7EAEB2131F7CBD3D |
SHA-512: | E2608B2784D0B3209DEDA7EFF902B6C436731E1B802F7A99F43C3B0DE94FF82D6CE6B5F2CBC8E10774869F35E282E8325ECCE510D94E2157CB93C60466CD0098 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5685791 |
Entropy (8bit): | 7.735296057845514 |
Encrypted: | false |
SSDEEP: | 98304:qRvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:IbdaVTEGcwqO10bLy |
MD5: | D0E390AC18F930C652A4FCC2A45C9CA4 |
SHA1: | 7A8DB921C74A384E09FE7C609FF6521108BEE057 |
SHA-256: | 77A469B75D58B5875FB3F207B28558579C9C9E7A3818E01280B890F32D07FF2E |
SHA-512: | 4E28B50F7788EC2720FAF84E6A024FE13DFBB10F26E2FCE74662F898C3FA2C29191E651266BE1965E1E55395CE47FBDBC4C01CBD879743EE3911EE2F0A488D09 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 5685791 |
Entropy (8bit): | 7.735295496320632 |
Encrypted: | false |
SSDEEP: | 98304:6RvTCmITyYdLBTEMwsJDvIdYzQMvCOsG/cbLxf1e:4bdaVTEGcwqO10bLy |
MD5: | 0DE35E59AFD8E5578F4290FC54FE4BD6 |
SHA1: | 44234146F2061D1FB5711188B8BCD02F155F3B71 |
SHA-256: | 52D6AD21096DAB1F17D3BED3DEC1C201CA9D83183A017E2B310AE3059BE3DCF0 |
SHA-512: | C87B5CA312E1BFA206453A8CB436D0AD24099766FC0024592E8BF154BCD30E4902D041FCC604CDE211B677FF4F5AD946B4E9BA4C21A5E18963ABF54D46A68958 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 262144 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:: |
MD5: | EC87A838931D4D5D2E94A04644788A55 |
SHA1: | 2E000FA7E85759C7F4C254D4D9C33EF481E459A7 |
SHA-256: | 8A39D2ABD3999AB73C34DB2476849CDDF303CE389B35826850F9A700589B4A90 |
SHA-512: | 9DD0C30167FBEAF68DFBBAD8E1AF552A7A1FCAE120B6E04F1B41FA76C76D5A78922FF828F5CFFD8C02965CDE57D63DCBFB4C479B3CB49C9D8107A7D5244E9D03 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2364728 |
Entropy (8bit): | 6.606009669324617 |
Encrypted: | false |
SSDEEP: | 49152:lbCT2kOGRpfJMi3kLRQrjYgeeZyTDwMHfDYZNBi:TkOKMiY0BZMHfDYZNBi |
MD5: | 967F4470627F823F4D7981E511C9824F |
SHA1: | 416501B096DF80DDC49F4144C3832CF2CADB9CB2 |
SHA-256: | B22BF1210B5FD173A210EBFA9092390AA0513C41E1914CBE161EB547F049EF91 |
SHA-512: | 8883EAD428C9D4B415046DE9F8398AA1F65AE81FE7945A840C822620E18F6F9930CCE2E10ACFF3B5DA8B9C817ADE3DABC1DE576CBD255087267F77341900A41C |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2588672 |
Entropy (8bit): | 6.714111096542978 |
Encrypted: | false |
SSDEEP: | 49152:igj3aKUFQ66gutvqTooLG9svhd31ChrL0ZRj7b9g4KkkC+ITQg7RHyNYGnhdA9D6:sQv306s3RtW7 |
MD5: | 08C63FBD8CFA501F75E8A40A32E41041 |
SHA1: | 850AF6ABFDCF672C97D8CAABCA5B628DE1AD3908 |
SHA-256: | D4B79564B3913356F04EE52AF2042E8D99594FB0C282B475D598CF415AA750FA |
SHA-512: | 4CE519E32E3627C6068FA141B09CC024687B50415A8533D113A136EB7F560D886D8D71F4A6E5FAD003190ED21F9CD5B8DC3ECE1DFE067C7247160E2391ED40EB |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\9mauyKC3JW.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9094368 |
Entropy (8bit): | 6.822465768734483 |
Encrypted: | false |
SSDEEP: | 196608:Ywdj1UbkCchr3rlFE8GCWhKUzGZ3gRTFHnBz58//o:Yw91Ubkxhr3rlFHWhKUzGZ3gRTFhzi/o |
MD5: | 480F8CF600F5509595B8418C6534CAF2 |
SHA1: | DC13258EBB83BDF956523D751F67E29D6E4CF77E |
SHA-256: | 6D8905EC0B1DFDC0A10D1CCE40714DDD73205A09AD390B933DDBECDCF06A4CF2 |
SHA-512: | F0BD99F68D59E80538FB276945D0F383394CB94A35C6D12EBD3E87061222249F78B9CA75716B33E36B66842B97C71149612111FCB6A8A3BC3A97635B03934AAF |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\9mauyKC3JW.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4545536 |
Entropy (8bit): | 7.132330028096879 |
Encrypted: | false |
SSDEEP: | 98304:azKnK7RZKZk8AZ1uWhgTsOTb+W5gmTKuCIUMPaFownQCICDQ:JRZkB1WlgmFPa+CICD |
MD5: | E3DB6AFB62515EC147015918CBB41E88 |
SHA1: | 52F5074BC4D57CAD731E7C97DB4A9CA636109740 |
SHA-256: | DB58D478C154E460E78133830D40387DA5E3870FE8EBFA799F6A178FC4C9D054 |
SHA-512: | 52BDA55A91C709767DF8B3E1F38CE3D3DB7B109056A14E038B92EB8B942C0F3D90628974E77C1590C22737A6E5BB5153A3F3887F3E54EA07ED68B742FEB6032E |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\9mauyKC3JW.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63226 |
Entropy (8bit): | 4.525950628745209 |
Encrypted: | false |
SSDEEP: | 768:TcwpzR+Xc4tuOcAGZo7BFBidnoNVDr1oLhVXhNC6U64EmBsudXeMu+30nFroewda:9zdAg4BFIGl6XS6UlBsakFrovg |
MD5: | 9AE57CD30A5F2756173F52A36A409E0F |
SHA1: | D420BD051FE7695C8898A6B7F6401169F648B1D6 |
SHA-256: | 5B09F2CCA4D56C667DE09A308CA48FECF1C7577C26FF99EB858799FD6C75ACC3 |
SHA-512: | 9193A32C6D34B6117B53223BFBFA8D6A451F57464FF1A4EEE2D3C75146B257D2E7FCFC6153450F013189769315B8030CC2F1B14EEA0BE3863F075BECE759FA15 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 871 |
Entropy (8bit): | 5.06988650426241 |
Encrypted: | false |
SSDEEP: | 12:8PQS49dz4OSkChlY//X+5eL6/F/RhKjAZNHl/eJI9WKmV:8m3zv3x254OGA48WKm |
MD5: | 1E228FB04C4C299C5B5F37B8A43F64FA |
SHA1: | 6828BCBF8CEB3A34CDB0EA6FE98BAA33A50877F8 |
SHA-256: | F917307767E265274963DB2FCD6E6C72870F0F35B3373DE4A2A8099E01191558 |
SHA-512: | FFF436CEE7E578944587228FAAEF7A4102AF08F704684DF18D4E5211441CF6CFBEE2A948B26BB9890B8C1D808475A6098FF68B3D40B381715B5513E5DB00E915 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\9mauyKC3JW.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4551445 |
Entropy (8bit): | 7.957419975728077 |
Encrypted: | false |
SSDEEP: | 98304:eo/JG7NH2ZIhXD8f5oBj0BjgQSbpr6d8sfWTxwaLS9TfZ2:z/87N22XDu5e8gnPsfWw9U |
MD5: | ED0003315889A453764BD67087E27DCB |
SHA1: | A5F5398BE3E35A31362EC06A8F7F95922141746B |
SHA-256: | C0EE9297F933FDA00F4AF59D1B4107960C3A24836CB260D5532F989DA196DE37 |
SHA-512: | 83D08BBAF47A7E48AA7F857AC277FFD6B0C16AAEA8723928AC9063626618C95AF662A1C8338B7CE45D546253A841788C9B788C2A6A984E6CA1DBE0158B21EE2F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2588672 |
Entropy (8bit): | 6.714111096542978 |
Encrypted: | false |
SSDEEP: | 49152:igj3aKUFQ66gutvqTooLG9svhd31ChrL0ZRj7b9g4KkkC+ITQg7RHyNYGnhdA9D6:sQv306s3RtW7 |
MD5: | 08C63FBD8CFA501F75E8A40A32E41041 |
SHA1: | 850AF6ABFDCF672C97D8CAABCA5B628DE1AD3908 |
SHA-256: | D4B79564B3913356F04EE52AF2042E8D99594FB0C282B475D598CF415AA750FA |
SHA-512: | 4CE519E32E3627C6068FA141B09CC024687B50415A8533D113A136EB7F560D886D8D71F4A6E5FAD003190ED21F9CD5B8DC3ECE1DFE067C7247160E2391ED40EB |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 9094368 |
Entropy (8bit): | 6.822465768734483 |
Encrypted: | false |
SSDEEP: | 196608:Ywdj1UbkCchr3rlFE8GCWhKUzGZ3gRTFHnBz58//o:Yw91Ubkxhr3rlFHWhKUzGZ3gRTFhzi/o |
MD5: | 480F8CF600F5509595B8418C6534CAF2 |
SHA1: | DC13258EBB83BDF956523D751F67E29D6E4CF77E |
SHA-256: | 6D8905EC0B1DFDC0A10D1CCE40714DDD73205A09AD390B933DDBECDCF06A4CF2 |
SHA-512: | F0BD99F68D59E80538FB276945D0F383394CB94A35C6D12EBD3E87061222249F78B9CA75716B33E36B66842B97C71149612111FCB6A8A3BC3A97635B03934AAF |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4545536 |
Entropy (8bit): | 7.132330028096879 |
Encrypted: | false |
SSDEEP: | 98304:azKnK7RZKZk8AZ1uWhgTsOTb+W5gmTKuCIUMPaFownQCICDQ:JRZkB1WlgmFPa+CICD |
MD5: | E3DB6AFB62515EC147015918CBB41E88 |
SHA1: | 52F5074BC4D57CAD731E7C97DB4A9CA636109740 |
SHA-256: | DB58D478C154E460E78133830D40387DA5E3870FE8EBFA799F6A178FC4C9D054 |
SHA-512: | 52BDA55A91C709767DF8B3E1F38CE3D3DB7B109056A14E038B92EB8B942C0F3D90628974E77C1590C22737A6E5BB5153A3F3887F3E54EA07ED68B742FEB6032E |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63226 |
Entropy (8bit): | 4.525950628745209 |
Encrypted: | false |
SSDEEP: | 768:TcwpzR+Xc4tuOcAGZo7BFBidnoNVDr1oLhVXhNC6U64EmBsudXeMu+30nFroewda:9zdAg4BFIGl6XS6UlBsakFrovg |
MD5: | 9AE57CD30A5F2756173F52A36A409E0F |
SHA1: | D420BD051FE7695C8898A6B7F6401169F648B1D6 |
SHA-256: | 5B09F2CCA4D56C667DE09A308CA48FECF1C7577C26FF99EB858799FD6C75ACC3 |
SHA-512: | 9193A32C6D34B6117B53223BFBFA8D6A451F57464FF1A4EEE2D3C75146B257D2E7FCFC6153450F013189769315B8030CC2F1B14EEA0BE3863F075BECE759FA15 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\hv.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4551445 |
Entropy (8bit): | 7.957419975728077 |
Encrypted: | false |
SSDEEP: | 98304:eo/JG7NH2ZIhXD8f5oBj0BjgQSbpr6d8sfWTxwaLS9TfZ2:z/87N22XDu5e8gnPsfWw9U |
MD5: | ED0003315889A453764BD67087E27DCB |
SHA1: | A5F5398BE3E35A31362EC06A8F7F95922141746B |
SHA-256: | C0EE9297F933FDA00F4AF59D1B4107960C3A24836CB260D5532F989DA196DE37 |
SHA-512: | 83D08BBAF47A7E48AA7F857AC277FFD6B0C16AAEA8723928AC9063626618C95AF662A1C8338B7CE45D546253A841788C9B788C2A6A984E6CA1DBE0158B21EE2F |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.996148375386849 |
TrID: |
|
File name: | 9mauyKC3JW.exe |
File size: | 9'118'184 bytes |
MD5: | ae130c89b7d8c4c9fd06422faeb79fc9 |
SHA1: | b5fdcc9e63448dd0f68b75b7bf54ff3fef94623c |
SHA256: | b13a4e5207954eaeb6aaf32e333a4f366a86afc0779406c9bf17805d5b83e2e9 |
SHA512: | 650f4d4d383db5e9b9f2cc32bb3d5c74e4f265ec86b311ad715df065cd9f00ba38be2d37cdb8b6adf955c39eafbf616bb1dac159baac2b93cbe5e45b2b931def |
SSDEEP: | 196608:+pNmeBG+ftWTWNkP6H+j/H0fiHF9FcaWmLOtgyd90PC9rK/prrKD36:+pNmWG+lMJP/r0KHrFcaWmytpdePC9Dm |
TLSH: | 4E9633903345F4FAE136E5B62F7C87A242B5DE4926810F4FA7A60E1F1EC2BD1950B0D6 |
File Content Preview: | MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...~.&L.....................................0....@..........................0.......3.......................................P............................. |
Icon Hash: | d292fcd8f2f2fe1c |
Entrypoint: | 0x411def |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | |
Time Stamp: | 0x4C26F87E [Sun Jun 27 07:06:38 2010 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b5a014d7eeb4c2042897567e1288a095 |
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00414C50h |
push 00411F80h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 68h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
xor ebx, ebx |
mov dword ptr [ebp-04h], ebx |
push 00000002h |
call dword ptr [00413184h] |
pop ecx |
or dword ptr [00419924h], FFFFFFFFh |
or dword ptr [00419928h], FFFFFFFFh |
call dword ptr [00413188h] |
mov ecx, dword ptr [0041791Ch] |
mov dword ptr [eax], ecx |
call dword ptr [0041318Ch] |
mov ecx, dword ptr [00417918h] |
mov dword ptr [eax], ecx |
mov eax, dword ptr [00413190h] |
mov eax, dword ptr [eax] |
mov dword ptr [00419920h], eax |
call 00007FCB65041B82h |
cmp dword ptr [00417710h], ebx |
jne 00007FCB65041A6Eh |
push 00411F78h |
call dword ptr [00413194h] |
pop ecx |
call 00007FCB65041B54h |
push 00417048h |
push 00417044h |
call 00007FCB65041B3Fh |
mov eax, dword ptr [00417914h] |
mov dword ptr [ebp-6Ch], eax |
lea eax, dword ptr [ebp-6Ch] |
push eax |
push dword ptr [00417910h] |
lea eax, dword ptr [ebp-64h] |
push eax |
lea eax, dword ptr [ebp-70h] |
push eax |
lea eax, dword ptr [ebp-60h] |
push eax |
call dword ptr [0041319Ch] |
push 00417040h |
push 00417000h |
call 00007FCB65041B0Ch |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x150dc | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x1a000 | 0x18d04 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x13000 | 0x310 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x11317 | 0x11400 | 797279c5ab1a163aed1f2a528f9fe3ce | False | 0.6174988677536232 | data | 6.576987441854239 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x13000 | 0x30ea | 0x3200 | 1359639b02bcb8f0a8743e6ead1c0030 | False | 0.43828125 | data | 5.549434098115495 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x17000 | 0x292c | 0x800 | 9415c9c8dea3245d6d73c23393e27d8e | False | 0.431640625 | data | 3.6583182363171756 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x1a000 | 0x18d04 | 0x18e00 | 9dee09854e79aa987e5336a4defda540 | False | 0.2433358197236181 | data | 5.382874846103129 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x1a1f0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | Russian | Russia | 0.6781914893617021 |
RT_ICON | 0x1a658 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | Russian | Russia | 0.47068480300187615 |
RT_ICON | 0x1b700 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | Russian | Russia | 0.41161825726141077 |
RT_ICON | 0x1dca8 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | Russian | Russia | 0.3213863958431743 |
RT_ICON | 0x21ed0 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | Russian | Russia | 0.1865609842659411 |
RT_GROUP_ICON | 0x326f8 | 0x4c | data | Russian | Russia | 0.7763157894736842 |
RT_VERSION | 0x32744 | 0x350 | data | English | United States | 0.47523584905660377 |
RT_MANIFEST | 0x32a94 | 0x270 | ASCII text, with very long lines (624), with no line terminators | English | United States | 0.5144230769230769 |
DLL | Import |
---|---|
COMCTL32.dll | |
KERNEL32.dll | GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, LoadLibraryA, LockResource, LoadResource, SizeofResource, FindResourceExA, MulDiv, GlobalFree, GlobalAlloc, lstrcmpiA, GetSystemDefaultLCID, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, MultiByteToWideChar, GetLocaleInfoW, lstrlenA, lstrcmpiW, GetEnvironmentVariableW, lstrcmpW, GlobalMemoryStatusEx, VirtualAlloc, WideCharToMultiByte, ExpandEnvironmentStringsW, RemoveDirectoryW, FindClose, FindNextFileW, DeleteFileW, FindFirstFileW, SetThreadLocale, GetLocalTime, GetSystemTimeAsFileTime, lstrlenW, GetTempPathW, SetEnvironmentVariableW, CloseHandle, CreateFileW, GetDriveTypeW, SetCurrentDirectoryW, GetModuleFileNameW, GetCommandLineW, GetVersionExW, CreateEventW, SetEvent, ResetEvent, InitializeCriticalSection, TerminateThread, ResumeThread, SuspendThread, IsBadReadPtr, LocalFree, lstrcpyW, FormatMessageW, GetSystemDirectoryW, DeleteCriticalSection, GetFileSize, SetFilePointer, ReadFile, SetFileTime, SetEndOfFile, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetModuleHandleA, SystemTimeToFileTime, GetLastError, CreateThread, WaitForSingleObject, GetExitCodeThread, Sleep, SetLastError, SetFileAttributesW, GetDiskFreeSpaceExW, lstrcatW, ExitProcess, CompareFileTime, GetStartupInfoA |
USER32.dll | CharUpperW, EndDialog, DestroyWindow, KillTimer, ReleaseDC, DispatchMessageW, GetMessageW, SetTimer, CreateWindowExW, ScreenToClient, GetWindowRect, wsprintfW, GetParent, GetSystemMenu, EnableMenuItem, EnableWindow, MessageBeep, LoadIconW, LoadImageW, wvsprintfW, IsWindow, DefWindowProcW, CallWindowProcW, DrawIconEx, DialogBoxIndirectParamW, GetWindow, ClientToScreen, GetDC, DrawTextW, ShowWindow, SystemParametersInfoW, SetFocus, SetWindowLongW, GetSystemMetrics, GetClientRect, GetDlgItem, GetKeyState, MessageBoxA, wsprintfA, SetWindowTextW, GetSysColor, GetWindowTextLengthW, GetWindowTextW, GetClassNameA, GetWindowLongW, GetMenu, SetWindowPos, CopyImage, SendMessageW, GetWindowDC |
GDI32.dll | GetCurrentObject, StretchBlt, SetStretchBltMode, CreateCompatibleBitmap, SelectObject, CreateCompatibleDC, GetObjectW, GetDeviceCaps, DeleteObject, CreateFontIndirectW, DeleteDC |
SHELL32.dll | SHGetFileInfoW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetMalloc, ShellExecuteExW, SHGetSpecialFolderPathW, ShellExecuteW |
ole32.dll | CoInitialize, CreateStreamOnHGlobal, CoCreateInstance |
OLEAUT32.dll | VariantClear, OleLoadPicture, SysAllocString |
MSVCRT.dll | __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, memset, _wcsnicmp, strncmp, malloc, memmove, _wtol, memcpy, free, memcmp, _purecall, ??2@YAPAXI@Z, ??3@YAXPAX@Z, _except_handler3, _controlfp |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
Russian | Russia | |
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T08:15:52.621984+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49711 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:15:53.549685+0100 | 2056550 | ET MALWARE Win32/DeerStealer CnC Checkin | 1 | 192.168.2.8 | 49711 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:15:55.284043+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49713 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:15:57.338216+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49714 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:05.356520+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49716 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:08.819571+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49717 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:10.842099+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49718 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:12.781810+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49719 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:14.704165+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49720 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:17.109798+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49721 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:19.577127+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49722 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:23.630281+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.8 | 49723 | 172.67.153.243 | 443 | TCP |
2024-12-27T08:16:24.333173+0100 | 2056550 | ET MALWARE Win32/DeerStealer CnC Checkin | 1 | 192.168.2.8 | 49723 | 172.67.153.243 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 08:15:51.266072035 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:51.266136885 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:51.266196966 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:51.267795086 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:51.267812967 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:52.621258974 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:52.621984005 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:52.624870062 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:52.624886036 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:52.625155926 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:52.668507099 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:52.669495106 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:52.669537067 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:52.669639111 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.549719095 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.553225994 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.553286076 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.553369045 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.553452015 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.553502083 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.553518057 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.561297894 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.561347008 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.561363935 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.569998026 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.570051908 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.570067883 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.578250885 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.578303099 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.578318119 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.621512890 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.669044018 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.715255976 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.715291977 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.762120962 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.763892889 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.767860889 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.767914057 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.767931938 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.776133060 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.776190042 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.776221037 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.784209967 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.784265041 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.784281969 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.792412043 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.792464018 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.792478085 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.800463915 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.800514936 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.800530910 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.808715105 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.808773041 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.808790922 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.815157890 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.815231085 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.815241098 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.815274954 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.815347910 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.815423965 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.821708918 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.821763039 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.821780920 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.828175068 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.828226089 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.828243017 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.841034889 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.841089964 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.841114044 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.846920013 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.846971035 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.846988916 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.853403091 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.853460073 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.853478909 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.902751923 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.974096060 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.977186918 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.977251053 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.977281094 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.977320910 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.986399889 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.986407995 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.986463070 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:53.995652914 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.995660067 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:53.995714903 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.000308990 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.000355959 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.000386953 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.000416040 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.000457048 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.000510931 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.000557899 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.000627041 CET | 49711 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.000646114 CET | 443 | 49711 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.063123941 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.063216925 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:54.063288927 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.063580990 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:54.063615084 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.283950090 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.284043074 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.285485983 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.285511017 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.285804033 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.286915064 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.286963940 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.286971092 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.895854950 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.895945072 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:55.896106958 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.939452887 CET | 49713 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:55.939491034 CET | 443 | 49713 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:56.032913923 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:56.033035040 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:56.033163071 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:56.033544064 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:56.033581972 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:57.338087082 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:57.338216066 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:57.346563101 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:57.346612930 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:57.346962929 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:57.347718000 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:57.347784996 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:57.347795963 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:58.033941984 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:58.034007072 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:58.034069061 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:58.047130108 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:58.047159910 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:15:58.047195911 CET | 49714 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:15:58.047203064 CET | 443 | 49714 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:04.097177982 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:04.097254038 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:04.097317934 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:04.097738981 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:04.097754002 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.356442928 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.356519938 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.357762098 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.357775927 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.358004093 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.358979940 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.359885931 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.359921932 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360018015 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360053062 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360155106 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360179901 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360289097 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360320091 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360440969 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360470057 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360615969 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360641003 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360649109 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360652924 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360780954 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360802889 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.360826015 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360955954 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.360975981 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.407326937 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.407540083 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.407592058 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.407620907 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.451380014 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.451677084 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.451775074 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.451869965 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.495353937 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:05.495440960 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:05.539361000 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.403255939 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.403337002 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.403408051 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.403558016 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.403589964 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.403604984 CET | 49716 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.403610945 CET | 443 | 49716 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.450630903 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.450683117 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:07.450762033 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.451070070 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:07.451086044 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:08.819494009 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:08.819571018 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:08.820776939 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:08.820782900 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:08.820975065 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:08.821791887 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:08.821821928 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:08.821825027 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:09.619201899 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:09.619272947 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:09.619471073 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:09.619733095 CET | 49717 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:09.619749069 CET | 443 | 49717 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:09.628319025 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:09.628401995 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:09.628551960 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:09.628856897 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:09.628870010 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:10.841835022 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:10.842098951 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:10.843424082 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:10.843447924 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:10.843717098 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:10.844564915 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:10.844607115 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:10.844613075 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.458291054 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.458463907 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.458719015 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.458839893 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.458880901 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.458880901 CET | 49718 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.458903074 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.458935976 CET | 443 | 49718 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.477114916 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.477173090 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:11.477252960 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.477551937 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:11.477565050 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:12.781722069 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:12.781810045 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:12.783092022 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:12.783102989 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:12.783351898 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:12.784162998 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:12.784188986 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:12.784193039 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.423371077 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.423446894 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.423490047 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.424290895 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.424307108 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.424324989 CET | 49719 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.424330950 CET | 443 | 49719 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.490767956 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.490832090 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:13.490901947 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.491450071 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:13.491462946 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:14.704049110 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:14.704164982 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:14.706588984 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:14.706605911 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:14.706907034 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:14.707613945 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:14.707658052 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:14.707664967 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.311872959 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.312036037 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.312094927 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.315459967 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.315485001 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.315500975 CET | 49720 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.315514088 CET | 443 | 49720 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.850256920 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.850367069 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:15.850459099 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.850723028 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:15.850745916 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.109630108 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.109797955 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.111320972 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.111342907 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.111641884 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.112526894 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.112658978 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.112689018 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.112791061 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.112822056 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:17.112946033 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:17.112987041 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.181848049 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.181925058 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.182049036 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.182188988 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.182219982 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.182238102 CET | 49721 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.182245970 CET | 443 | 49721 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.224566936 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.224638939 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:18.224723101 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.225017071 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:18.225027084 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:19.577060938 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:19.577126980 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:19.579226017 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:19.579235077 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:19.579515934 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:19.580205917 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:19.580226898 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:19.580229998 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:20.199409008 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:20.199598074 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:20.199664116 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:20.199749947 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:20.199796915 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:20.199796915 CET | 49722 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:20.199820042 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:20.199841976 CET | 443 | 49722 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:22.321963072 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:22.322097063 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:22.322206974 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:22.323144913 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:22.323180914 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:23.630182981 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:23.630280972 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:23.631505966 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:23.631520033 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:23.631912947 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:23.684098005 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:23.712938070 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:23.712960958 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:23.713201046 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:24.333190918 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:24.333268881 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:24.333340883 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:24.333425999 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:24.333455086 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Dec 27, 2024 08:16:24.333468914 CET | 49723 | 443 | 192.168.2.8 | 172.67.153.243 |
Dec 27, 2024 08:16:24.333475113 CET | 443 | 49723 | 172.67.153.243 | 192.168.2.8 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 08:15:50.858737946 CET | 55398 | 53 | 192.168.2.8 | 1.1.1.1 |
Dec 27, 2024 08:15:51.260879993 CET | 53 | 55398 | 1.1.1.1 | 192.168.2.8 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 27, 2024 08:15:50.858737946 CET | 192.168.2.8 | 1.1.1.1 | 0xef0f | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 27, 2024 08:15:51.260879993 CET | 1.1.1.1 | 192.168.2.8 | 0xef0f | No error (0) | 172.67.153.243 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 08:15:51.260879993 CET | 1.1.1.1 | 192.168.2.8 | 0xef0f | No error (0) | 104.21.12.244 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.8 | 49711 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:15:52 UTC | 364 | OUT | |
2024-12-27 07:15:52 UTC | 96 | OUT | |
2024-12-27 07:15:53 UTC | 883 | IN | |
2024-12-27 07:15:53 UTC | 17 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN | |
2024-12-27 07:15:53 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.8 | 49713 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:15:55 UTC | 483 | OUT | |
2024-12-27 07:15:55 UTC | 53 | OUT | |
2024-12-27 07:15:55 UTC | 755 | IN | |
2024-12-27 07:15:55 UTC | 24 | IN | |
2024-12-27 07:15:55 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.8 | 49714 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:15:57 UTC | 484 | OUT | |
2024-12-27 07:15:57 UTC | 208 | OUT | |
2024-12-27 07:15:58 UTC | 854 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.8 | 49716 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:05 UTC | 487 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:05 UTC | 15331 | OUT | |
2024-12-27 07:16:07 UTC | 869 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.8 | 49717 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:08 UTC | 484 | OUT | |
2024-12-27 07:16:08 UTC | 745 | OUT | |
2024-12-27 07:16:09 UTC | 863 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.8 | 49718 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:10 UTC | 484 | OUT | |
2024-12-27 07:16:10 UTC | 212 | OUT | |
2024-12-27 07:16:11 UTC | 852 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.8 | 49719 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:12 UTC | 484 | OUT | |
2024-12-27 07:16:12 UTC | 380 | OUT | |
2024-12-27 07:16:13 UTC | 864 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.8 | 49720 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:14 UTC | 483 | OUT | |
2024-12-27 07:16:14 UTC | 35 | OUT | |
2024-12-27 07:16:15 UTC | 858 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.8 | 49721 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:17 UTC | 486 | OUT | |
2024-12-27 07:16:17 UTC | 15331 | OUT | |
2024-12-27 07:16:17 UTC | 15331 | OUT | |
2024-12-27 07:16:17 UTC | 15331 | OUT | |
2024-12-27 07:16:17 UTC | 15331 | OUT | |
2024-12-27 07:16:17 UTC | 13831 | OUT | |
2024-12-27 07:16:18 UTC | 858 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.8 | 49722 | 172.67.153.243 | 443 | 1296 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:19 UTC | 483 | OUT | |
2024-12-27 07:16:19 UTC | 35 | OUT | |
2024-12-27 07:16:20 UTC | 749 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.8 | 49723 | 172.67.153.243 | 443 | 4080 | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 07:16:23 UTC | 364 | OUT | |
2024-12-27 07:16:23 UTC | 96 | OUT | |
2024-12-27 07:16:24 UTC | 734 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:15:05 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\9mauyKC3JW.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 9'118'184 bytes |
MD5 hash: | AE130C89B7D8C4C9FD06422FAEB79FC9 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 02:15:08 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\hv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe20000 |
File size: | 9'094'368 bytes |
MD5 hash: | 480F8CF600F5509595B8418C6534CAF2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:15:09 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 9'094'368 bytes |
MD5 hash: | 480F8CF600F5509595B8418C6534CAF2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:15:11 |
Start date: | 27/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:15:11 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 02:15:36 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000000 |
File size: | 2'364'728 bytes |
MD5 hash: | 967F4470627F823F4D7981E511C9824F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 02:15:37 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 9'094'368 bytes |
MD5 hash: | 480F8CF600F5509595B8418C6534CAF2 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 10 |
Start time: | 02:15:39 |
Start date: | 27/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 02:15:39 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 15 |
Start time: | 02:15:50 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Roaming\Chromewizard\hv.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 9'094'368 bytes |
MD5 hash: | 480F8CF600F5509595B8418C6534CAF2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Reputation: | low |
Has exited: | true |
Target ID: | 16 |
Start time: | 02:15:50 |
Start date: | 27/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | true |
Target ID: | 17 |
Start time: | 02:15:51 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6ee680000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 20 |
Start time: | 02:16:07 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\Localdockerv3.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x140000000 |
File size: | 2'364'728 bytes |
MD5 hash: | 967F4470627F823F4D7981E511C9824F |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | true |
Execution Graph
Execution Coverage: | 17.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 25.9% |
Total number of Nodes: | 1474 |
Total number of Limit Nodes: | 20 |
Graph
Function 00404FAA Relevance: 250.2, APIs: 103, Strings: 39, Instructions: 1671keyboardsynchronizationwindowCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F9D Relevance: 33.4, APIs: 16, Strings: 3, Instructions: 150stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401626 Relevance: 22.8, APIs: 15, Instructions: 304COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040301A Relevance: 7.5, APIs: 5, Instructions: 45COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040118A Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401B37 Relevance: 14.0, APIs: 7, Strings: 1, Instructions: 47timewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00410CD0 Relevance: 7.5, APIs: 1, Strings: 4, Instructions: 23COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402844 Relevance: 6.4, APIs: 5, Instructions: 118stringCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040150B Relevance: 6.1, APIs: 4, Instructions: 100synchronizationthreadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401986 Relevance: 6.0, APIs: 4, Instructions: 27COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040ADC3 Relevance: 4.5, APIs: 3, Instructions: 35COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C9FC Relevance: 3.2, APIs: 2, Instructions: 184COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A62F Relevance: 3.1, APIs: 2, Instructions: 135COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040112B Relevance: 3.0, APIs: 2, Instructions: 42COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022B0 Relevance: 3.0, APIs: 2, Instructions: 34COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D9F0 Relevance: 3.0, APIs: 2, Instructions: 30COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040ECED Relevance: 3.0, APIs: 2, Instructions: 24memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040E73A Relevance: 2.5, APIs: 2, Instructions: 34COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A7DE Relevance: 1.6, APIs: 1, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040120B Relevance: 1.5, APIs: 1, Instructions: 28COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DA56 Relevance: 1.5, APIs: 1, Instructions: 23fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DB97 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040653F Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CC59 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DADC Relevance: 1.5, APIs: 1, Instructions: 18fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DB6A Relevance: 1.5, APIs: 1, Instructions: 9timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D89F Relevance: 1.3, APIs: 1, Instructions: 70COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F42D Relevance: 1.3, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402F6C Relevance: 1.3, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D985 Relevance: 1.3, APIs: 1, Instructions: 16COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004024C4 Relevance: 1.3, APIs: 1, Instructions: 12memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401B1F Relevance: 1.3, APIs: 1, Instructions: 5COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F3FC Relevance: 1.3, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004034C1 Relevance: 37.0, APIs: 20, Strings: 1, Instructions: 290comCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401BDF Relevance: 26.3, APIs: 11, Strings: 4, Instructions: 85libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406D5D Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 39libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041022D Relevance: .5, Instructions: 501COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041206B Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411F91 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D72E Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404AFF Relevance: 36.9, APIs: 14, Strings: 7, Instructions: 144fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404603 Relevance: 35.2, APIs: 3, Strings: 17, Instructions: 207stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402DC0 Relevance: 35.1, APIs: 16, Strings: 4, Instructions: 123windowlibrarystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DF3 Relevance: 28.1, APIs: 14, Strings: 2, Instructions: 120windowcommemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403093 Relevance: 26.5, APIs: 10, Strings: 5, Instructions: 244stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A47 Relevance: 24.3, APIs: 16, Instructions: 270COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040677A Relevance: 13.5, APIs: 9, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406DB2 Relevance: 12.1, APIs: 8, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040695E Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407B33 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 102windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040408B Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 96stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040755F Relevance: 10.6, APIs: 7, Instructions: 63timethreadinjectionCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401000 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 44stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004021ED Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 39libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402185 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 13libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004021B9 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 12libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402A69 Relevance: 6.1, APIs: 4, Instructions: 101COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403F85 Relevance: 6.1, APIs: 4, Instructions: 66COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A85 Relevance: 6.1, APIs: 4, Instructions: 65COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407FA5 Relevance: 6.1, APIs: 4, Instructions: 57COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067ED Relevance: 6.1, APIs: 4, Instructions: 56COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040748A Relevance: 6.1, APIs: 4, Instructions: 55COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027C7 Relevance: 6.1, APIs: 4, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403AB1 Relevance: 6.0, APIs: 4, Instructions: 41COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040702A Relevance: 6.0, APIs: 4, Instructions: 34windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401BA3 Relevance: 6.0, APIs: 4, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 1.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 0.9% |
Total number of Nodes: | 678 |
Total number of Limit Nodes: | 2 |
Graph
Function 6CAF8856 Relevance: 324.3, APIs: 5, Strings: 179, Instructions: 2273COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD4A7D6 Relevance: 4.6, APIs: 3, Instructions: 77COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CAF7104 Relevance: 2.6, Strings: 2, Instructions: 73COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CBF1090 Relevance: 17.8, APIs: 8, Strings: 2, Instructions: 264memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CBEFF50 Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 114windowCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6CD38C2A Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0000000140021A00 Relevance: 5.6, APIs: 1, Strings: 2, Instructions: 320COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 000000014000D458 Relevance: 5.5, APIs: 1, Strings: 2, Instructions: 247COMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|