Windows
Analysis Report
document pdf.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- document pdf.exe (PID: 3420 cmdline:
"C:\Users\ user\Deskt op\documen t pdf.exe" MD5: C67B6FF2D472BF82DC4DA545DBC37A43) - document pdf.exe (PID: 2672 cmdline:
"C:\Users\ user\Deskt op\documen t pdf.exe" MD5: C67B6FF2D472BF82DC4DA545DBC37A43) - WerFault.exe (PID: 3352 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 3 420 -s 134 0 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Email ID": "director@igakuin.com", "Password": "wVCMFq@2wVCMFq@2", "Host": "us2.smtp.mailhostbox.com", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "director@igakuin.com", "Password": "wVCMFq@2wVCMFq@2", "Host": "us2.smtp.mailhostbox.com", "Port": "587", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 14 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
Click to see the 27 entries |
System Summary |
---|
Source: | Author: frack113: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T16:01:13.092549+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.6 | 49750 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:14.845558+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.6 | 49769 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:16.236493+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.6 | 49778 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:17.739768+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.6 | 49790 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:22.185426+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.6 | 49825 | 188.114.96.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T16:01:11.323685+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49731 | 132.226.8.169 | 80 | TCP |
2025-01-06T16:01:12.526830+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49731 | 132.226.8.169 | 80 | TCP |
2025-01-06T16:01:14.276805+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.6 | 49756 | 132.226.8.169 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T16:01:25.666289+0100 | 1810007 | 1 | Potentially Bad Traffic | 192.168.2.6 | 49847 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 3_2_00F1F2C0 | |
Source: | Code function: | 3_2_00F1F4AC | |
Source: | Code function: | 3_2_00F1F961 | |
Source: | Code function: | 3_2_06692DC8 | |
Source: | Code function: | 3_2_06690B30 | |
Source: | Code function: | 3_2_06690B30 | |
Source: | Code function: | 3_2_06692968 | |
Source: | Code function: | 3_2_06690673 | |
Source: | Code function: | 3_2_0669DE00 | |
Source: | Code function: | 3_2_0669E6B0 | |
Source: | Code function: | 3_2_0669EF60 | |
Source: | Code function: | 3_2_0669CCA0 | |
Source: | Code function: | 3_2_0669D550 | |
Source: | Code function: | 3_2_06692DC2 | |
Source: | Code function: | 3_2_0669E258 | |
Source: | Code function: | 3_2_0669EB08 | |
Source: | Code function: | 3_2_0669F3B8 | |
Source: | Code function: | 3_2_06690040 | |
Source: | Code function: | 3_2_06690853 | |
Source: | Code function: | 3_2_0669F810 | |
Source: | Code function: | 3_2_0669D0F8 | |
Source: | Code function: | 3_2_0669310E | |
Source: | Code function: | 3_2_0669D9A8 |
Networking |
---|
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0306E5A4 | |
Source: | Code function: | 0_2_05717490 | |
Source: | Code function: | 0_2_05717480 | |
Source: | Code function: | 0_2_05710690 | |
Source: | Code function: | 0_2_05710680 | |
Source: | Code function: | 0_2_058040D0 | |
Source: | Code function: | 0_2_05804E38 | |
Source: | Code function: | 0_2_05802918 | |
Source: | Code function: | 0_2_058098CC | |
Source: | Code function: | 0_2_05802361 | |
Source: | Code function: | 0_2_05802368 | |
Source: | Code function: | 0_2_058098C4 | |
Source: | Code function: | 0_2_0580ABE8 | |
Source: | Code function: | 3_2_00F1A088 | |
Source: | Code function: | 3_2_00F1C146 | |
Source: | Code function: | 3_2_00F1D278 | |
Source: | Code function: | 3_2_00F15362 | |
Source: | Code function: | 3_2_00F1C468 | |
Source: | Code function: | 3_2_00F1C738 | |
Source: | Code function: | 3_2_00F169A0 | |
Source: | Code function: | 3_2_00F1E988 | |
Source: | Code function: | 3_2_00F1CA08 | |
Source: | Code function: | 3_2_00F1CCD8 | |
Source: | Code function: | 3_2_00F13E09 | |
Source: | Code function: | 3_2_00F16FC8 | |
Source: | Code function: | 3_2_00F1CFAA | |
Source: | Code function: | 3_2_00F129E0 | |
Source: | Code function: | 3_2_00F1E97A | |
Source: | Code function: | 3_2_00F1F961 | |
Source: | Code function: | 3_2_06691E80 | |
Source: | Code function: | 3_2_066917A0 | |
Source: | Code function: | 3_2_0669FC68 | |
Source: | Code function: | 3_2_06699C70 | |
Source: | Code function: | 3_2_06699548 | |
Source: | Code function: | 3_2_06690B30 | |
Source: | Code function: | 3_2_06695028 | |
Source: | Code function: | 3_2_06692968 | |
Source: | Code function: | 3_2_06691E70 | |
Source: | Code function: | 3_2_0669DE00 | |
Source: | Code function: | 3_2_0669E6AF | |
Source: | Code function: | 3_2_0669E6A0 | |
Source: | Code function: | 3_2_0669E6B0 | |
Source: | Code function: | 3_2_0669EF60 | |
Source: | Code function: | 3_2_0669EF51 | |
Source: | Code function: | 3_2_0669178F | |
Source: | Code function: | 3_2_0669CCA0 | |
Source: | Code function: | 3_2_0669CC8F | |
Source: | Code function: | 3_2_0669D540 | |
Source: | Code function: | 3_2_0669D550 | |
Source: | Code function: | 3_2_0669DDFF | |
Source: | Code function: | 3_2_0669DDF1 | |
Source: | Code function: | 3_2_0669E24A | |
Source: | Code function: | 3_2_0669E258 | |
Source: | Code function: | 3_2_0669EAF8 | |
Source: | Code function: | 3_2_06699328 | |
Source: | Code function: | 3_2_06690B20 | |
Source: | Code function: | 3_2_0669EB08 | |
Source: | Code function: | 3_2_06699BFB | |
Source: | Code function: | 3_2_06698BA0 | |
Source: | Code function: | 3_2_0669F3B8 | |
Source: | Code function: | 3_2_06698B91 | |
Source: | Code function: | 3_2_06690040 | |
Source: | Code function: | 3_2_0669F802 | |
Source: | Code function: | 3_2_06690006 | |
Source: | Code function: | 3_2_06695018 | |
Source: | Code function: | 3_2_0669F810 | |
Source: | Code function: | 3_2_0669D0F8 | |
Source: | Code function: | 3_2_0669D9A8 | |
Source: | Code function: | 3_2_0669D999 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_06699548 |
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 1 DLL Side-Loading | 11 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 1 Email Collection | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 11 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 41 Virtualization/Sandbox Evasion | Security Account Manager | 41 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 1 Data from Local System | 1 Non-Standard Port | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 3 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 System Network Configuration Discovery | SSH | Keylogging | 3 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Obfuscated Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | 24 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 12 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
74% | Virustotal | Browse | ||
66% | ReversingLabs | ByteCode-MSIL.Trojan.SnakeKeylogger | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
us2.smtp.mailhostbox.com | 208.91.199.225 | true | true | unknown | |
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | high | |
reallyfreegeoip.org | 188.114.96.3 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high | |
checkip.dyndns.com | 132.226.8.169 | true | false | high | |
18.31.95.13.in-addr.arpa | unknown | unknown | false | high | |
checkip.dyndns.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
132.226.8.169 | checkip.dyndns.com | United States | 16989 | UTMEMUS | false | |
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
188.114.96.3 | reallyfreegeoip.org | European Union | 13335 | CLOUDFLARENETUS | false | |
208.91.199.225 | us2.smtp.mailhostbox.com | United States | 394695 | PUBLIC-DOMAIN-REGISTRYUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1584835 |
Start date and time: | 2025-01-06 16:00:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 8m 26s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 13 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | document pdf.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/6@5/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.73.29, 13.107.246.45, 40.126.32.136, 23.56.254.164, 20.12.23.50, 13.95.31.18, 172.202.163.200
- Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, azureedge-t-prod.trafficmanager.net, umwatson.events.data.microsoft.com
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
Time | Type | Description |
---|---|---|
10:01:07 | API Interceptor | |
10:01:13 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
132.226.8.169 | Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | VIP Keylogger | Browse |
| ||
149.154.167.220 | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
reallyfreegeoip.org | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
us2.smtp.mailhostbox.com | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
api.telegram.org | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer, Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
UTMEMUS | Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
PUBLIC-DOMAIN-REGISTRYUS | Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, RHADAMANTHYS | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, RHADAMANTHYS | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, MassLogger RAT, PureLog Stealer | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_document pdf.exe_dcc08682314b30b79d29fa1c2a2fab423dbfc8b9_0c65fa10_faf57872-d2c8-45f1-8106-7b8831eb10fe\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.1324276941010312 |
Encrypted: | false |
SSDEEP: | 192:i0z7l30stA0BU/qa+OJoNZrYjzuiFcIZ24IO8V:i63HxBU/qa5XzuiFcIY4IO8V |
MD5: | 69196623F65F3FA586119772455FF634 |
SHA1: | 11198347B211C84E4278F3DD3538570F6680AA27 |
SHA-256: | 00C642DE0CAF61D52352763AE1CE10D6A06A91C564E553E383301617721365AE |
SHA-512: | 2091EB7444D8263115D8D1629B817BD9ACF7C1C1E1CCE334DD0F2426BCACD5340AD36ADC0F05ACC0B1D9FF34C8F982D23A1F87848F1CBA1263FF88E123D5D08D |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 309231 |
Entropy (8bit): | 4.066699273044065 |
Encrypted: | false |
SSDEEP: | 3072:clLe6SVGBDhW8V6w0xbr2o4uEqN+O+vLTgHiyJf1bp:clL1SVGBtRXeGo4++O+DTgCyr |
MD5: | 5F3B2D5C84A52AABCDB08A535ADDB597 |
SHA1: | 9A73A738185FB55697BFFF8BE50C8A806DB6ABC1 |
SHA-256: | 0C737E630ADAC246CA33BAC6605558E4D37A6A9C6609F9ED618A24D6FD9D8325 |
SHA-512: | DBC2D2B71CBD0D27B5ECAA610450FF27A393C4C6B69621AB3CF0A90DDDC2D86A7F47E27D4210B5962CBDEFE09D7025055EA30859CE03367EC8D79DE4BB3C8977 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8418 |
Entropy (8bit): | 3.6931458086857663 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJBLl6hmi6Y2DTmSU90ycgmfZwNpra89bt+sfjvm:R6lXJX6N6YvSU9Pcgmfazt9fS |
MD5: | FCFE1687E5FE1E24F8A0F917FAA798F3 |
SHA1: | 458B6D22B1499ADC9F3DCAB64DCD67809718D68E |
SHA-256: | C478FC4D83690346677F1A465CE90F7075337ACB2B2976DEDBAA81C268FAAE65 |
SHA-512: | FBD70F1BD3C1B79642CC27475C8B6AB95F4C0DAB3376ABC4753C4CDA15B47912D877073D52E3B6E91BC3BD213C116A4CE5C49D5D2FB8574FCECB300BB576AAD9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4751 |
Entropy (8bit): | 4.457807230516727 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsDNJg77aI9BWWpW8VYvYm8M4J7EtbfFco+q8vdtb8mUDdp0dVCd:uIjfLI7P37VfJ7ERqoKdR8mUxp0dVCd |
MD5: | 3615BD54168E56AC04D094C763333600 |
SHA1: | 71CAB1EB9A8A00097C816319B6B8D0ED5DB8DA13 |
SHA-256: | 61236876295607A3384F24E00A09AB236B720E5235743C8D7C8675497DCDDDAA |
SHA-512: | BEB768F81C2217F3E7A0F390BC0EC156324C96C0C06C8BDA8AD3D91A856C06F188D456928FD31F1D270745DCAFCC444782CFD14B86502EDD7ACBDC3E402BCE0B |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\document pdf.exe |
File Type: | |
Category: | modified |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.468755808571753 |
Encrypted: | false |
SSDEEP: | 6144:vzZfpi6ceLPx9skLmb0fzZWSP3aJG8nAgeiJRMMhA2zX4WABluuNKjDH5S:7ZHtzZWOKnMM6bFpwj4 |
MD5: | DDD2BE517BADB51059B007FC390F2B4F |
SHA1: | 13F406617898A25A195095C2B2641AC9FB137797 |
SHA-256: | 432E37A067DC4BBAF1ED027DD555DEEA134773B3DF569776E84EE7F8AD03D9AB |
SHA-512: | B31D7E478DC338B5B8A70CB02A2F873CD8942775F7BC1747025443418C56F05FC2214166EB6E866799563E90E89E0E85180445F456102F747A5F0CB117A6C35E |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.853019642802023 |
TrID: |
|
File name: | document pdf.exe |
File size: | 759'808 bytes |
MD5: | c67b6ff2d472bf82dc4da545dbc37a43 |
SHA1: | c5e677e5e48d5ca965b6e2d3f0c8b56fb80e7be5 |
SHA256: | df3c8cc4eaf6b0a8a6a0254c54160486df1b38f8a6591a60dbc520f38389c400 |
SHA512: | 69ba6f8e9e99f09a669ae875412af6bcb87dd649161e8e725be05c9db2ce8fe20da88de509cd9208a427b93172caeb94ed588efa5697eb0ebf5fe262d8943e11 |
SSDEEP: | 12288:74doaeS+/ZgdvAC+O8DzxPzNjZGtypP2q2PEexgQNqaCBCrRKNr6sj9Gn:EdFeSTdv+O8vxPzNjUtE7280RNqaLrMc |
TLSH: | C4F412E8AE15CC86D8C607B50A32F33B66784E9ED923C253CBDCFDF7751166964182A0 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...W.sg..............0..r...$......B.... ........@.. ....................................@................................ |
Icon Hash: | 53952576d1abd26e |
Entrypoint: | 0x4b9142 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67738157 [Tue Dec 31 05:29:59 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add al, byte ptr [eax] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xb90f0 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xba000 | 0x21a0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xbe000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xb7168 | 0xb7200 | 8cd28819f66881db546fcdecf83efc16 | False | 0.9313246587030717 | data | 7.85898553696103 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xba000 | 0x21a0 | 0x2200 | a31bd1c02d4d4cbb683678a915ffa8d7 | False | 0.8984375 | data | 7.474587072139768 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xbe000 | 0xc | 0x200 | 69949a08773b28bfcd5c98e6312f10fb | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xba0c8 | 0x1d72 | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9698859113823295 | ||
RT_GROUP_ICON | 0xbbe4c | 0x14 | data | 1.05 | ||
RT_VERSION | 0xbbe70 | 0x32c | data | 0.4618226600985222 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-06T16:01:11.323685+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.6 | 49731 | 132.226.8.169 | 80 | TCP |
2025-01-06T16:01:12.526830+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.6 | 49731 | 132.226.8.169 | 80 | TCP |
2025-01-06T16:01:13.092549+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.6 | 49750 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:14.276805+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.6 | 49756 | 132.226.8.169 | 80 | TCP |
2025-01-06T16:01:14.845558+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.6 | 49769 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:16.236493+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.6 | 49778 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:17.739768+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.6 | 49790 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:22.185426+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.6 | 49825 | 188.114.96.3 | 443 | TCP |
2025-01-06T16:01:25.666289+0100 | 1810007 | Joe Security ANOMALY Telegram Send Message | 1 | 192.168.2.6 | 49847 | 149.154.167.220 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 6, 2025 16:01:09.443880081 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:09.448697090 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:09.451230049 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:09.454629898 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:09.459398985 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:11.017657042 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:11.027211905 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:11.031995058 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:11.280863047 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:11.323684931 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:11.355398893 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:11.355431080 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:11.355518103 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:11.415021896 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:11.415035963 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:11.897778034 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:11.897888899 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:11.908380032 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:11.908396959 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:11.908735991 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:11.950437069 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.053241014 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.099339962 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.170140982 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.170202017 CET | 443 | 49744 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.170300007 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.204561949 CET | 49744 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.210125923 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:12.214957952 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:12.477199078 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:12.480148077 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.480175018 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.480236053 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.480727911 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.480740070 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.526829958 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:12.956809998 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:12.963751078 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:12.963763952 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:13.092585087 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:13.092645884 CET | 443 | 49750 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:13.092699051 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:13.093344927 CET | 49750 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:13.097086906 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:13.098479033 CET | 49756 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:13.103308916 CET | 80 | 49756 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:13.103389978 CET | 49756 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:13.103512049 CET | 49756 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:13.104187012 CET | 80 | 49731 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:13.104269981 CET | 49731 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:13.108227968 CET | 80 | 49756 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:14.221856117 CET | 80 | 49756 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:14.231432915 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.231482029 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.231548071 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.231995106 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.232011080 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.276804924 CET | 49756 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:14.700351000 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.702382088 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.702408075 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.845314026 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.845372915 CET | 443 | 49769 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:14.845520020 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.846013069 CET | 49769 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:14.852261066 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:14.857026100 CET | 80 | 49772 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:14.857084990 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:14.857208014 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:14.862010002 CET | 80 | 49772 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:15.638887882 CET | 80 | 49772 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:15.640721083 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:15.640765905 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:15.640834093 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:15.641274929 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:15.641294003 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:15.683053017 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.099010944 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:16.101175070 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:16.101197004 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:16.236545086 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:16.236607075 CET | 443 | 49778 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:16.236716986 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:16.237221003 CET | 49778 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:16.240848064 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.242088079 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.245820999 CET | 80 | 49772 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:16.245964050 CET | 49772 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.247176886 CET | 80 | 49784 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:16.247239113 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.247406006 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:16.252345085 CET | 80 | 49784 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:17.113532066 CET | 80 | 49784 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:17.115052938 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.115098953 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.115237951 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.115540028 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.115562916 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.167445898 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.579071999 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.580980062 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.581022978 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.739783049 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.739857912 CET | 443 | 49790 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:17.739979982 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.740607977 CET | 49790 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:17.744532108 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.745976925 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.749665022 CET | 80 | 49784 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:17.750772953 CET | 80 | 49795 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:17.750850916 CET | 49784 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.750883102 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.751070976 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:17.755872965 CET | 80 | 49795 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:18.564538956 CET | 80 | 49795 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:18.566026926 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:18.566061974 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:18.566145897 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:18.566433907 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:18.566451073 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:18.604983091 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.042164087 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:19.046576023 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:19.046596050 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:19.217732906 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:19.217797041 CET | 443 | 49801 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:19.217868090 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:19.218409061 CET | 49801 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:19.222429037 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.223521948 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.227509022 CET | 80 | 49795 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:19.227580070 CET | 49795 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.228316069 CET | 80 | 49807 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:19.228401899 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.228496075 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:19.233225107 CET | 80 | 49807 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:20.002355099 CET | 80 | 49807 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:20.004267931 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.004312992 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.004378080 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.004705906 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.004724026 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.042459011 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.489613056 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.492687941 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.492721081 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.650108099 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.650182009 CET | 443 | 49813 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:20.650249004 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.650846958 CET | 49813 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:20.655106068 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.656398058 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.660139084 CET | 80 | 49807 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:20.660223961 CET | 49807 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.661267042 CET | 80 | 49819 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:20.661338091 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.661452055 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:20.666183949 CET | 80 | 49819 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:21.534334898 CET | 80 | 49819 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:21.535761118 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:21.535813093 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:21.535890102 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:21.536237955 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:21.536252975 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:21.589376926 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.018743038 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:22.020756960 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:22.020791054 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:22.185461998 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:22.185532093 CET | 443 | 49825 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:22.185579062 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:22.186455011 CET | 49825 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:22.190324068 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.191492081 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.195310116 CET | 80 | 49819 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:22.195453882 CET | 49819 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.196315050 CET | 80 | 49830 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:22.196405888 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.196525097 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:22.201277018 CET | 80 | 49830 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:24.151318073 CET | 80 | 49830 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:24.153719902 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.153750896 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.153829098 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.154232025 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.154242992 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.198738098 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:24.616772890 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.618767023 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.618788958 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.757488966 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.757556915 CET | 443 | 49841 | 188.114.96.3 | 192.168.2.6 |
Jan 6, 2025 16:01:24.757666111 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.758250952 CET | 49841 | 443 | 192.168.2.6 | 188.114.96.3 |
Jan 6, 2025 16:01:24.772551060 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:24.777749062 CET | 80 | 49830 | 132.226.8.169 | 192.168.2.6 |
Jan 6, 2025 16:01:24.777929068 CET | 49830 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:24.781382084 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:24.781424046 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:24.781488895 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:24.781955957 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:24.781970024 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.419817924 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.419944048 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:25.422080040 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:25.422091007 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.422355890 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.423873901 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:25.467339039 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.666327953 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.666400909 CET | 443 | 49847 | 149.154.167.220 | 192.168.2.6 |
Jan 6, 2025 16:01:25.666457891 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:25.671247005 CET | 49847 | 443 | 192.168.2.6 | 149.154.167.220 |
Jan 6, 2025 16:01:31.135541916 CET | 49756 | 80 | 192.168.2.6 | 132.226.8.169 |
Jan 6, 2025 16:01:31.315087080 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:31.319930077 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:31.320003033 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.010430098 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.010634899 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.015398026 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.162626982 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.163796902 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.168663025 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.318629026 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.318988085 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.323811054 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.482357979 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.482727051 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.487518072 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.636765957 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.642741919 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.647547960 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.811463118 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.815440893 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:32.820560932 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:32.820739031 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:34.327042103 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:34.331988096 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:34.332070112 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:34.888252020 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:34.888520956 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:34.893395901 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.041076899 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.041270971 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:35.046133995 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.193973064 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.194879055 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:35.199631929 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.350573063 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.353735924 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:35.358568907 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.505721092 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.508920908 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:35.513730049 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.675283909 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.676799059 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:35.681734085 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 |
Jan 6, 2025 16:01:35.681806087 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 |
Jan 6, 2025 16:01:36.284513950 CET | 51718 | 53 | 192.168.2.6 | 162.159.36.2 |
Jan 6, 2025 16:01:36.289339066 CET | 53 | 51718 | 162.159.36.2 | 192.168.2.6 |
Jan 6, 2025 16:01:36.289434910 CET | 51718 | 53 | 192.168.2.6 | 162.159.36.2 |
Jan 6, 2025 16:01:36.294322014 CET | 53 | 51718 | 162.159.36.2 | 192.168.2.6 |
Jan 6, 2025 16:01:36.741638899 CET | 51718 | 53 | 192.168.2.6 | 162.159.36.2 |
Jan 6, 2025 16:01:36.746630907 CET | 53 | 51718 | 162.159.36.2 | 192.168.2.6 |
Jan 6, 2025 16:01:36.746689081 CET | 51718 | 53 | 192.168.2.6 | 162.159.36.2 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 6, 2025 16:01:09.422313929 CET | 57001 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 6, 2025 16:01:09.429550886 CET | 53 | 57001 | 1.1.1.1 | 192.168.2.6 |
Jan 6, 2025 16:01:11.347264051 CET | 49782 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 6, 2025 16:01:11.354531050 CET | 53 | 49782 | 1.1.1.1 | 192.168.2.6 |
Jan 6, 2025 16:01:24.773298979 CET | 55573 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 6, 2025 16:01:24.780596018 CET | 53 | 55573 | 1.1.1.1 | 192.168.2.6 |
Jan 6, 2025 16:01:31.303633928 CET | 54445 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 6, 2025 16:01:31.314274073 CET | 53 | 54445 | 1.1.1.1 | 192.168.2.6 |
Jan 6, 2025 16:01:36.283829927 CET | 53 | 64147 | 162.159.36.2 | 192.168.2.6 |
Jan 6, 2025 16:01:36.752532959 CET | 57969 | 53 | 192.168.2.6 | 1.1.1.1 |
Jan 6, 2025 16:01:36.759881020 CET | 53 | 57969 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 6, 2025 16:01:09.422313929 CET | 192.168.2.6 | 1.1.1.1 | 0x46db | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 6, 2025 16:01:11.347264051 CET | 192.168.2.6 | 1.1.1.1 | 0xd2da | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 6, 2025 16:01:24.773298979 CET | 192.168.2.6 | 1.1.1.1 | 0xf2ab | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 6, 2025 16:01:31.303633928 CET | 192.168.2.6 | 1.1.1.1 | 0x8932 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 6, 2025 16:01:36.752532959 CET | 192.168.2.6 | 1.1.1.1 | 0xb848 | Standard query (0) | PTR (Pointer record) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 6, 2025 16:01:06.648171902 CET | 1.1.1.1 | 192.168.2.6 | 0xd065 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:06.648171902 CET | 1.1.1.1 | 192.168.2.6 | 0xd065 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:09.429550886 CET | 1.1.1.1 | 192.168.2.6 | 0x46db | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:11.354531050 CET | 1.1.1.1 | 192.168.2.6 | 0xd2da | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:11.354531050 CET | 1.1.1.1 | 192.168.2.6 | 0xd2da | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:24.780596018 CET | 1.1.1.1 | 192.168.2.6 | 0xf2ab | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:31.314274073 CET | 1.1.1.1 | 192.168.2.6 | 0x8932 | No error (0) | 208.91.199.225 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:31.314274073 CET | 1.1.1.1 | 192.168.2.6 | 0x8932 | No error (0) | 208.91.199.223 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:31.314274073 CET | 1.1.1.1 | 192.168.2.6 | 0x8932 | No error (0) | 208.91.199.224 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:31.314274073 CET | 1.1.1.1 | 192.168.2.6 | 0x8932 | No error (0) | 208.91.198.143 | A (IP address) | IN (0x0001) | false | ||
Jan 6, 2025 16:01:36.759881020 CET | 1.1.1.1 | 192.168.2.6 | 0xb848 | Name error (3) | none | none | PTR (Pointer record) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49731 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:09.454629898 CET | 151 | OUT | |
Jan 6, 2025 16:01:11.017657042 CET | 273 | IN | |
Jan 6, 2025 16:01:11.027211905 CET | 127 | OUT | |
Jan 6, 2025 16:01:11.280863047 CET | 273 | IN | |
Jan 6, 2025 16:01:12.210125923 CET | 127 | OUT | |
Jan 6, 2025 16:01:12.477199078 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49756 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:13.103512049 CET | 127 | OUT | |
Jan 6, 2025 16:01:14.221856117 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49772 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:14.857208014 CET | 151 | OUT | |
Jan 6, 2025 16:01:15.638887882 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49784 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:16.247406006 CET | 151 | OUT | |
Jan 6, 2025 16:01:17.113532066 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49795 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:17.751070976 CET | 151 | OUT | |
Jan 6, 2025 16:01:18.564538956 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49807 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:19.228496075 CET | 151 | OUT | |
Jan 6, 2025 16:01:20.002355099 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49819 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:20.661452055 CET | 151 | OUT | |
Jan 6, 2025 16:01:21.534334898 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49830 | 132.226.8.169 | 80 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 6, 2025 16:01:22.196525097 CET | 151 | OUT | |
Jan 6, 2025 16:01:24.151318073 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49744 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:12 UTC | 85 | OUT | |
2025-01-06 15:01:12 UTC | 859 | IN | |
2025-01-06 15:01:12 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49750 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:12 UTC | 61 | OUT | |
2025-01-06 15:01:13 UTC | 859 | IN | |
2025-01-06 15:01:13 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49769 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:14 UTC | 61 | OUT | |
2025-01-06 15:01:14 UTC | 857 | IN | |
2025-01-06 15:01:14 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49778 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:16 UTC | 61 | OUT | |
2025-01-06 15:01:16 UTC | 857 | IN | |
2025-01-06 15:01:16 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49790 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:17 UTC | 61 | OUT | |
2025-01-06 15:01:17 UTC | 861 | IN | |
2025-01-06 15:01:17 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49801 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:19 UTC | 85 | OUT | |
2025-01-06 15:01:19 UTC | 865 | IN | |
2025-01-06 15:01:19 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49813 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:20 UTC | 85 | OUT | |
2025-01-06 15:01:20 UTC | 855 | IN | |
2025-01-06 15:01:20 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49825 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:22 UTC | 61 | OUT | |
2025-01-06 15:01:22 UTC | 857 | IN | |
2025-01-06 15:01:22 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.6 | 49841 | 188.114.96.3 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:24 UTC | 85 | OUT | |
2025-01-06 15:01:24 UTC | 859 | IN | |
2025-01-06 15:01:24 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.6 | 49847 | 149.154.167.220 | 443 | 2672 | C:\Users\user\Desktop\document pdf.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-06 15:01:25 UTC | 349 | OUT | |
2025-01-06 15:01:25 UTC | 344 | IN | |
2025-01-06 15:01:25 UTC | 55 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Jan 6, 2025 16:01:32.010430098 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 220 us2.outbound.mailhostbox.com ESMTP Postfix |
Jan 6, 2025 16:01:32.010634899 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 | EHLO 680718 |
Jan 6, 2025 16:01:32.162626982 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 250-us2.outbound.mailhostbox.com 250-PIPELINING 250-SIZE 41648128 250-VRFY 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING |
Jan 6, 2025 16:01:32.163796902 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 | AUTH login ZGlyZWN0b3JAaWdha3Vpbi5jb20= |
Jan 6, 2025 16:01:32.318629026 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 334 UGFzc3dvcmQ6 |
Jan 6, 2025 16:01:32.482357979 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 235 2.7.0 Authentication successful |
Jan 6, 2025 16:01:32.482727051 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 | MAIL FROM:<director@igakuin.com> |
Jan 6, 2025 16:01:32.636765957 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 250 2.1.0 Ok |
Jan 6, 2025 16:01:32.642741919 CET | 49890 | 587 | 192.168.2.6 | 208.91.199.225 | RCPT TO:<director@igakuin.com> |
Jan 6, 2025 16:01:32.811463118 CET | 587 | 49890 | 208.91.199.225 | 192.168.2.6 | 550 5.4.6 <director@igakuin.com>: Recipient address rejected: Email Sending Quota Exceeded |
Jan 6, 2025 16:01:34.888252020 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 220 us2.outbound.mailhostbox.com ESMTP Postfix |
Jan 6, 2025 16:01:34.888520956 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 | EHLO 680718 |
Jan 6, 2025 16:01:35.041076899 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 250-us2.outbound.mailhostbox.com 250-PIPELINING 250-SIZE 41648128 250-VRFY 250-ETRN 250-STARTTLS 250-AUTH PLAIN LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING |
Jan 6, 2025 16:01:35.041270971 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 | AUTH login ZGlyZWN0b3JAaWdha3Vpbi5jb20= |
Jan 6, 2025 16:01:35.193973064 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 334 UGFzc3dvcmQ6 |
Jan 6, 2025 16:01:35.350573063 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 235 2.7.0 Authentication successful |
Jan 6, 2025 16:01:35.353735924 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 | MAIL FROM:<director@igakuin.com> |
Jan 6, 2025 16:01:35.505721092 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 250 2.1.0 Ok |
Jan 6, 2025 16:01:35.508920908 CET | 49910 | 587 | 192.168.2.6 | 208.91.199.225 | RCPT TO:<director@igakuin.com> |
Jan 6, 2025 16:01:35.675283909 CET | 587 | 49910 | 208.91.199.225 | 192.168.2.6 | 550 5.4.6 <director@igakuin.com>: Recipient address rejected: Email Sending Quota Exceeded |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 10:01:07 |
Start date: | 06/01/2025 |
Path: | C:\Users\user\Desktop\document pdf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 759'808 bytes |
MD5 hash: | C67B6FF2D472BF82DC4DA545DBC37A43 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 10:01:08 |
Start date: | 06/01/2025 |
Path: | C:\Users\user\Desktop\document pdf.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x630000 |
File size: | 759'808 bytes |
MD5 hash: | C67B6FF2D472BF82DC4DA545DBC37A43 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 6 |
Start time: | 10:01:08 |
Start date: | 06/01/2025 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbd0000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 10.2% |
Dynamic/Decrypted Code Coverage: | 97% |
Signature Coverage: | 3% |
Total number of Nodes: | 101 |
Total number of Limit Nodes: | 6 |
Graph
Function 05717490 Relevance: 5.5, Strings: 4, Instructions: 500COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05717480 Relevance: 5.5, Strings: 4, Instructions: 489COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05804E38 Relevance: 3.2, Instructions: 3181COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 058040D0 Relevance: .7, Instructions: 726COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 058098CC Relevance: .6, Instructions: 623COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05802918 Relevance: .4, Instructions: 401COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0580ABE8 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 058098C4 Relevance: .3, Instructions: 271COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0306B7B7 Relevance: 1.7, APIs: 1, Instructions: 202COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 057122B0 Relevance: 1.7, APIs: 1, Instructions: 169COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05711740 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05711894 Relevance: 1.6, APIs: 1, Instructions: 97COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030658EC Relevance: 1.6, APIs: 1, Instructions: 97COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 030644C4 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0580BDD0 Relevance: 1.6, APIs: 1, Instructions: 85COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0306D818 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05809A0C Relevance: 1.6, APIs: 1, Instructions: 56windowCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0306B9B8 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0175D3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0175D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0176D1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0176D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0175D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0175D3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0176D017 Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0176D1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05710690 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05802361 Relevance: .3, Instructions: 266COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05802368 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0306E5A4 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05710680 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 16.6% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 26.5% |
Total number of Nodes: | 34 |
Total number of Limit Nodes: | 6 |
Graph
Function 06699548 Relevance: 1.9, APIs: 1, Instructions: 357COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1C146 Relevance: 1.5, Strings: 1, Instructions: 234COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1A088 Relevance: .9, Instructions: 900COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690B30 Relevance: .7, Instructions: 709COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F169A0 Relevance: .5, Instructions: 515COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F16FC8 Relevance: .5, Instructions: 455COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F13E09 Relevance: .4, Instructions: 433COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692968 Relevance: .3, Instructions: 268COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692DC8 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06692DC2 Relevance: .2, Instructions: 218COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669310E Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1C468 Relevance: .2, Instructions: 200COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F15362 Relevance: .2, Instructions: 197COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1D278 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1CCD8 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1CA08 Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1CFAA Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1C738 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1E988 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1E97A Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669992C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F12790 Relevance: 1.3, Strings: 1, Instructions: 88COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1E018 Relevance: .6, Instructions: 647COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F10CA0 Relevance: .5, Instructions: 539COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F176F1 Relevance: .5, Instructions: 477COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F15F38 Relevance: .3, Instructions: 266COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F16498 Relevance: .2, Instructions: 231COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F180D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F71F Relevance: .2, Instructions: 155COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F19C30 Relevance: .2, Instructions: 151COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1AEF0 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1D548 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F141A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1A303 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F13CC0 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F18EF8 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F15658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F18380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F162F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F128F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECD044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F14285 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F15649 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F19761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F640 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F16300 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F127F0 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F650 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1EB65 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00ECD03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F15E98 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1E8E8 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1ABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F19C2C Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F128A2 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F16739 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F128B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1D6D4 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1AFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F16748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690040 Relevance: .6, Instructions: 596COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F961 Relevance: .3, Instructions: 276COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E258 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669DE00 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669E6B0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669EF60 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669EB08 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F3B8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669F810 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D0F8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669CCA0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D550 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0669D9A8 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690673 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F2C0 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F1F4AC Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06690853 Relevance: .1, Instructions: 116COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F11A18 Relevance: 5.1, Strings: 4, Instructions: 119COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|