Windows
Analysis Report
kJsfHgzi7N.exe
Overview
General Information
Sample name: | kJsfHgzi7N.exerenamed because original name is a hash value |
Original sample name: | 72f57ef98a51163156a99fd1603031ed934e0760afe52c4eb535c82bede72b63.exe |
Analysis ID: | 1583093 |
MD5: | 98c6c6cab711f3b5eb8a3559ced3ab0e |
SHA1: | c17019e5cda21689b3f9bfc5df5f5e63194ba57b |
SHA256: | 72f57ef98a51163156a99fd1603031ed934e0760afe52c4eb535c82bede72b63 |
Tags: | exeuser-Chainskilabs |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- kJsfHgzi7N.exe (PID: 4876 cmdline:
"C:\Users\ user\Deskt op\kJsfHgz i7N.exe" MD5: 98C6C6CAB711F3B5EB8A3559CED3AB0E) - WerFault.exe (PID: 3452 cmdline:
C:\Windows \system32\ WerFault.e xe -u -p 4 876 -s 124 8 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["192.248.185.253"], "Port": 7000, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io |
| |
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
rat_win_xworm_v3 | Finds XWorm (version XClient, v3) samples based on characteristic strings | Sekoia.io |
| |
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:00:11.830544+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:23.209479+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:26.828489+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.558460+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.558550+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.559220+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.559473+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:46.053311+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:56.830267+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:57.475415+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:08.928508+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:17.834581+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:17.930827+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.026684+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.124423+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.305983+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.383799+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.483456+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:24.694204+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:26.844743+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:33.117454+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:33.208816+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:44.444827+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:47.103131+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:49.176782+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:53.928759+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:56.508161+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:56.860513+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.131775+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.225182+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.322117+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.417558+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:22.275882+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:26.876846+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:00:12.497239+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:23.211782+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:35.563456+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:46.054946+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:57.479317+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:08.937644+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:17.837185+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:17.932895+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.028706+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.126152+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.225577+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.307994+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.385661+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.484870+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.583533+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.589652+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.679784+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.684818+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:24.696021+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:33.125575+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:33.211659+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:44.447164+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:47.107242+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:49.180943+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:53.931001+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:56.509940+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.133594+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.228386+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.323916+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.419304+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:00:26.828489+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:56.830267+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:26.844743+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:56.860513+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:26.876846+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:02:22.085871+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | DNS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FFAAC516B22 | |
Source: | Code function: | 0_2_00007FFAAC515D76 | |
Source: | Code function: | 0_2_00007FFAAC512270 | |
Source: | Code function: | 0_2_00007FFAAC51ACB8 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Classification label: |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_00007FFAAC51756A | |
Source: | Code function: | 0_2_00007FFAAC51756A |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 1 DLL Side-Loading | 2 Process Injection | 1 Disable or Modify Tools | OS Credential Dumping | 131 Security Software Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 141 Virtualization/Sandbox Evasion | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Process Injection | Security Account Manager | 141 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 11 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 13 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
84% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
79% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1305769 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
241.42.69.40.in-addr.arpa | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
192.248.185.253 | unknown | France | 20473 | AS-CHOOPAUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583093 |
Start date and time: | 2025-01-01 21:59:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 14s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | kJsfHgzi7N.exerenamed because original name is a hash value |
Original Sample Name: | 72f57ef98a51163156a99fd1603031ed934e0760afe52c4eb535c82bede72b63.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@2/5@1/1 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.89.179.12, 13.107.246.45, 4.245.163.56, 40.69.42.241, 40.126.32.136
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target kJsfHgzi7N.exe, PID 4876 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtSetInformationFile calls found.
Time | Type | Description |
---|---|---|
15:59:58 | API Interceptor | |
17:18:51 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AS-CHOOPAUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai, Gafgyt | Browse |
| ||
Get hash | malicious | Metasploit | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
| ||
Get hash | malicious | NetSupport RAT | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_kJsfHgzi7N.exe_6e93cf24fbd62951e3558f64d8296fd8ae7a_00a58ed6_2dc9bf71-9b6a-444a-bdbd-43fc7e3d3cb2\Report.wer
Download File
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.21781300927216 |
Encrypted: | false |
SSDEEP: | 192:qgwzuN081iH5aWz8iyolHWHF3WzuiF4KZ24lO8m:5wzX81iZa48irIUzuiF4KY4lO8m |
MD5: | 317EF9D6F91089EE57E9EAE069C83FEB |
SHA1: | 9A0AB2F8ED8409A9AF93E4927B5BF80AD85320B8 |
SHA-256: | 960CCBDA26F314C3009C5327307C13CA5B733758CFA3B752FA7E11B5E0EC3CB0 |
SHA-512: | EF88F9323BB02B7288AF9676F619577ED4C62F1D2241AEAC1D03D35D2F5A5F074A434B67F3E4496C85149C183E40C35E8ED10FC4E73CD810DD53F25E5EF00CDA |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 555213 |
Entropy (8bit): | 3.01543941730729 |
Encrypted: | false |
SSDEEP: | 3072:bPwegPd0ZHr1CCq4GFrbI4uS3+vowe9mo4IdAyGecSTPlNxTFRRBq:krPapDqPbI4P3QowyrT5Zj |
MD5: | 963D54267F6F0E1328E630E46C8814B2 |
SHA1: | 40593B0C9FC69259DD4B8B2F1D4661CA116CAA79 |
SHA-256: | E9C7B40014D48C9BC904955E1AC58BC18FCE85BEF1F2C69771DC12DA304163AF |
SHA-512: | E0B5B5BB166BE4D760020D727EA7068DBB150EB60E3B5155C60B61605EB97733E0BBDFA2BAF3FD907C1937589F9339ACA2ADE203E4D53C258366104C7D3DE038 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8936 |
Entropy (8bit): | 3.707254536626789 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJteV6YNuPegmfZK8npr589bp8hmPHPrfTjm:R6lXJkV6YE2gmfwtpCmPHPrfG |
MD5: | 5E67C39E1A4B9429D73995DEE427FDEF |
SHA1: | 759D454F38F9F023DC5CF03E35ED77DC50112F62 |
SHA-256: | 9FE7F4E417F960397C09FB5F24D4479996CF8FB34666A41592FC6EC95E8EB293 |
SHA-512: | BA6E3416E0C0073A3EB2F9F4BC7D52E9B645A3D2CA5E4E3C3B0E36694B5F374A6CFAE95ACA95D6A42E8CB6B92F20806D02DFFC16003E02B2011E5DDE2F9F2FA6 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4780 |
Entropy (8bit): | 4.466411787079911 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zs3Jg771I9SBkudWpW8VYCYm8M4J5LlCFZvyq8vOLl462qNmBd:uIjfZI73Bkus7VmJ5pAvWOp465mBd |
MD5: | 26D1E60CCB9F5AEE537B30BE01395683 |
SHA1: | 0E023767BB03E242D76A69CC2EEA9713A14E3EC2 |
SHA-256: | 5A88420E7D37C69675A68CCB7EF4A2279D17DACC9F824E5B0D284EDE3E08AAF1 |
SHA-512: | 9F7C93B4DB7408693D17362D3169898ED537F68273E31649F8A5FE388CF09FB482AAC2B1DD5A71C785691DC48EE51FE234853624F5610D940B11035C5460A387 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\System32\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.416746311848536 |
Encrypted: | false |
SSDEEP: | 6144:Ycifpi6ceLPL9skLmb0mFSWSPtaJG8nAgex285i2MMhA20X4WABlGuNx5+:Ni58FSWIZBk2MM6AFBbo |
MD5: | D07DE0330EA9AF926BAFA8550DE83937 |
SHA1: | 2A9E7BDBB2EDC17C0E886E91DAD3CA76713B6B7F |
SHA-256: | 90A77088F7E7D2D17C3757E75EC42F7CA952FC4C840BE04E7F369BEB8D5BF6B5 |
SHA-512: | 426697815C91F4BC9EEA89CB4CE234DC95C71E7EB1723F6BD7916F273A0C7B517CEAEDBF77F3224F922F288D1C2EDE9D7CC5129549E8614C9BEC73C24AB7FFFC |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 5.589441063198639 |
TrID: |
|
File name: | kJsfHgzi7N.exe |
File size: | 33'280 bytes |
MD5: | 98c6c6cab711f3b5eb8a3559ced3ab0e |
SHA1: | c17019e5cda21689b3f9bfc5df5f5e63194ba57b |
SHA256: | 72f57ef98a51163156a99fd1603031ed934e0760afe52c4eb535c82bede72b63 |
SHA512: | 8c291eb5bc3801136ca50e7aa57af41597e754ce00c96bfacecf6d51b1c741076dafd16359f4b83d4247b5703871921320fac8c55485daff8b4d79e054aab62b |
SSDEEP: | 384:DEbmX5Qa+vN1h1+X3v6JFjL+g93Tm2eaFOfBdRApkFTBLTsOZwpGd2v99IkuiseE:QVa+vNtg+PB93Tw4iBdVFE9jjOjhOJy |
TLSH: | A3E23A4877D44312DAEEAFB12DF3620612709517E913EF6E0CE485EA2B67AC047407EA |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ug.................x..........n.... ........@.. ....................................@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40976e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6775EDBE [Thu Jan 2 01:37:02 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x971c | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xa000 | 0x4d8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xc000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x7774 | 0x7800 | 5d9eb24c02f95e0db6a4061aa0780c1a | False | 0.50087890625 | data | 5.740305735272717 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xa000 | 0x4d8 | 0x600 | afbb984503128042cc38bf70e5e337f4 | False | 0.375 | data | 3.7203482473352403 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xc000 | 0xc | 0x200 | 3ee5eb55d2c84cad34ece42377c6f250 | False | 0.044921875 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xa0a0 | 0x244 | data | 0.4724137931034483 | ||
RT_MANIFEST | 0xa2e8 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T22:00:11.645414+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:11.830544+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:12.497239+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:23.209479+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:23.211782+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:26.828489+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:26.828489+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.558460+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.558550+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.559220+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.559473+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:35.563456+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:46.053311+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:46.054946+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:00:56.830267+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:56.830267+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:57.475415+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:00:57.479317+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:08.928508+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:08.937644+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:17.834581+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:17.837185+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:17.930827+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:17.932895+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.026684+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.028706+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.124423+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.126152+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.225577+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.305983+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.307994+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.383799+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.385661+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.483456+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:18.484870+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.583533+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.589652+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.679784+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:18.684818+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:24.694204+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:24.696021+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:26.844743+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:26.844743+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:33.117454+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:33.125575+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:33.208816+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:33.211659+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:44.444827+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:44.447164+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:47.103131+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:47.107242+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:49.176782+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:49.180943+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:53.928759+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:53.931001+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:56.508161+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:56.509940+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:01:56.860513+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:01:56.860513+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.131775+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.133594+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.225182+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.228386+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.322117+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.323916+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:04.417558+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:04.419304+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:22.085871+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.7 | 49699 | 192.248.185.253 | 7000 | TCP |
2025-01-01T22:02:22.275882+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:26.876846+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
2025-01-01T22:02:26.876846+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 192.248.185.253 | 7000 | 192.168.2.7 | 49699 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 22:00:00.015779972 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:00.022018909 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:00.022094011 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:00.191355944 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:00.196263075 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:11.645414114 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:11.650221109 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:11.830543995 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:11.883074999 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:12.497239113 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:12.502084970 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:23.024394035 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:23.029196978 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:23.209479094 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:23.211781979 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:23.216653109 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:26.828489065 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:26.883153915 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:28.453387976 CET | 57696 | 53 | 192.168.2.7 | 162.159.36.2 |
Jan 1, 2025 22:00:28.458209038 CET | 53 | 57696 | 162.159.36.2 | 192.168.2.7 |
Jan 1, 2025 22:00:28.458292007 CET | 57696 | 53 | 192.168.2.7 | 162.159.36.2 |
Jan 1, 2025 22:00:28.463102102 CET | 53 | 57696 | 162.159.36.2 | 192.168.2.7 |
Jan 1, 2025 22:00:28.913335085 CET | 57696 | 53 | 192.168.2.7 | 162.159.36.2 |
Jan 1, 2025 22:00:28.918751955 CET | 53 | 57696 | 162.159.36.2 | 192.168.2.7 |
Jan 1, 2025 22:00:28.918811083 CET | 57696 | 53 | 192.168.2.7 | 162.159.36.2 |
Jan 1, 2025 22:00:34.446032047 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:34.450867891 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:35.558459997 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:35.558549881 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:35.558653116 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:35.559220076 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:35.559473038 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:35.559515953 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:35.559542894 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:35.563456059 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:35.568362951 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:45.867945910 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:45.872951984 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:46.053311110 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:46.054945946 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:46.059849977 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:56.830266953 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:56.883306026 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:57.290088892 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:57.295068979 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:57.475414991 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:00:57.479316950 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:00:57.484081030 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:08.713638067 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:08.718894005 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:08.928508043 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:08.937644005 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:08.942585945 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.649456024 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.654376984 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.665013075 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.669811010 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.774420977 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.779396057 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.790040970 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.794809103 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.834580898 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.837184906 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.842020988 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.868145943 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.873119116 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.899374008 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.904284000 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.915226936 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.920111895 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.930826902 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.932894945 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.981017113 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:17.981067896 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:17.986025095 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.026684046 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.028706074 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.033559084 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.040147066 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.045099020 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.124423027 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.126152039 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.134118080 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.212126970 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.217305899 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.223368883 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.225577116 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.273088932 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.273148060 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.277971029 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.290152073 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.295320988 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.305983067 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.307993889 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.353111029 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.353174925 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.358046055 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.383799076 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.385660887 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.433094978 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.483455896 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.484869957 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.489767075 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.581445932 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.583533049 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.589041948 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.589652061 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.594840050 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.677217007 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.679784060 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.684696913 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:18.684818029 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:18.689692020 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:24.508640051 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:24.513537884 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:24.694204092 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:24.696021080 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:24.700817108 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:26.844743013 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:26.899068117 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:32.931890011 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:32.936806917 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:33.011882067 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:33.016832113 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:33.117454052 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:33.125575066 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:33.130352974 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:33.208816051 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:33.211658955 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:33.216443062 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:44.259150982 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:44.264091969 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:44.444827080 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:44.447164059 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:44.451960087 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:46.917738914 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:46.922657967 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:47.103131056 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:47.107242107 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:47.112097979 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:48.977746964 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:48.996274948 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:49.176781893 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:49.180943012 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:49.185887098 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:53.743294001 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:53.749591112 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:53.928759098 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:53.931000948 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:53.935875893 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:56.321544886 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:56.326431990 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:56.508161068 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:56.509939909 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:01:56.514764071 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:56.860512972 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:01:56.917789936 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:03.946463108 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:03.951244116 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:03.962160110 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:03.966978073 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:03.977755070 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:03.982573986 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.118390083 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:04.123224974 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.131774902 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.133594036 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:04.181055069 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.225182056 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.228385925 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:04.233228922 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.322117090 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.323915958 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:04.331013918 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.417557955 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:04.419303894 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:04.424140930 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:22.085870981 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:22.090769053 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:22.275882006 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:22.321297884 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:26.876846075 CET | 7000 | 49699 | 192.248.185.253 | 192.168.2.7 |
Jan 1, 2025 22:02:26.930706024 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Jan 1, 2025 22:02:27.437553883 CET | 49699 | 7000 | 192.168.2.7 | 192.248.185.253 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 22:00:28.452795982 CET | 53 | 53254 | 162.159.36.2 | 192.168.2.7 |
Jan 1, 2025 22:00:28.923448086 CET | 55483 | 53 | 192.168.2.7 | 1.1.1.1 |
Jan 1, 2025 22:00:28.930855989 CET | 53 | 55483 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 1, 2025 22:00:28.923448086 CET | 192.168.2.7 | 1.1.1.1 | 0x78d0 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 1, 2025 22:00:28.930855989 CET | 1.1.1.1 | 192.168.2.7 | 0x78d0 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:59:55 |
Start date: | 01/01/2025 |
Path: | C:\Users\user\Desktop\kJsfHgzi7N.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x760000 |
File size: | 33'280 bytes |
MD5 hash: | 98C6C6CAB711F3B5EB8A3559CED3AB0E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 14 |
Start time: | 17:18:33 |
Start date: | 01/01/2025 |
Path: | C:\Windows\System32\WerFault.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7a4490000 |
File size: | 570'736 bytes |
MD5 hash: | FD27D9F6D02763BDE32511B5DF7FF7A0 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC515D76 Relevance: .5, Instructions: 470COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC516B22 Relevance: .5, Instructions: 456COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC516736 Relevance: .3, Instructions: 329COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517FA6 Relevance: .3, Instructions: 317COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517578 Relevance: .3, Instructions: 293COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC518F6A Relevance: .3, Instructions: 290COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC518038 Relevance: .2, Instructions: 244COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51845E Relevance: .2, Instructions: 233COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517DCD Relevance: .2, Instructions: 213COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5186F1 Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517588 Relevance: .2, Instructions: 199COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51366C Relevance: .2, Instructions: 196COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51897D Relevance: .2, Instructions: 190COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC519B72 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517598 Relevance: .2, Instructions: 188COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5175A8 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51148D Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5196FA Relevance: .2, Instructions: 160COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC519C25 Relevance: .2, Instructions: 154COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5189D0 Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5182F5 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC519335 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC519141 Relevance: .1, Instructions: 97COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC518B31 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC519259 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC510580 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC5112C1 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC517C21 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC511141 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51143B Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC511284 Relevance: .0, Instructions: 26COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC510795 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFAAC51ACB8 Relevance: .2, Instructions: 229COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|