Windows
Analysis Report
IpykYx5iwz.exe
Overview
General Information
Sample name: | IpykYx5iwz.exerenamed because original name is a hash value |
Original sample name: | 5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63.exe |
Analysis ID: | 1588020 |
MD5: | 15214c528c41de4d5e542ebd3d4ac075 |
SHA1: | bdab48d323ab0e0c4689061db5fb08adfe1afec8 |
SHA256: | 5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63 |
Tags: | exeGuLoadersigneduser-adrian__luca |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- IpykYx5iwz.exe (PID: 3608 cmdline:
"C:\Users\ user\Deskt op\IpykYx5 iwz.exe" MD5: 15214C528C41DE4D5E542EBD3D4AC075) - IpykYx5iwz.exe (PID: 180 cmdline:
"C:\Users\ user\Deskt op\IpykYx5 iwz.exe" MD5: 15214C528C41DE4D5E542EBD3D4AC075)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Remcos, RemcosRAT | Remcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
CloudEyE, GuLoader | CloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored. | No Attribution |
{"Host:Port:Password": ["subddfg.lol:2404:1"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-A65UIX", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security | ||
JoeSecurity_GuLoader_2 | Yara detected GuLoader | Joe Security | ||
JoeSecurity_Remcos | Yara detected Remcos RAT | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Christopher Peacock @securepeacock, SCYTHE @scythe_io: |
Source: | Author: frack113: |
Stealing of Sensitive Information |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T20:39:14.698396+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49737 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:39:37.086202+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:39:59.513567+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49826 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:40:21.908012+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49955 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:40:44.295391+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50009 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:06.685480+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50010 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:29.092444+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50011 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:51.468057+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50012 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:42:13.857616+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50013 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:42:36.234204+0100 | 2036594 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50014 | 94.156.177.164 | 2404 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T20:38:48.834449+0100 | 2803270 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49736 | 164.160.91.32 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406444 | |
Source: | Code function: | 0_2_00405909 | |
Source: | Code function: | 0_2_00402765 | |
Source: | Code function: | 1_2_00406444 | |
Source: | Code function: | 1_2_00402765 | |
Source: | Code function: | 1_2_00405909 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004053A6 |
E-Banking Fraud |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | 0_2_00403384 | |
Source: | Code function: | 1_2_00403384 |
Source: | Code function: | 0_2_004067CD | |
Source: | Code function: | 1_2_004067CD |
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Classification label: |
Source: | Code function: | 0_2_00403384 | |
Source: | Code function: | 1_2_00403384 |
Source: | Code function: | 0_2_00404661 |
Source: | Code function: | 0_2_00402138 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File written: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | File source: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file | ||
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | RDTSC instruction interceptor: | ||
Source: | RDTSC instruction interceptor: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Dropped PE file which has not been started: | Jump to dropped file |
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Code function: | 0_2_00406444 | |
Source: | Code function: | 0_2_00405909 | |
Source: | Code function: | 0_2_00402765 | |
Source: | Code function: | 1_2_00406444 | |
Source: | Code function: | 1_2_00402765 | |
Source: | Code function: | 1_2_00405909 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-3311 | ||
Source: | API call chain: | graph_0-3492 |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00403384 |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | Mutex created: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | 11 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | 11 Masquerading | OS Credential Dumping | 31 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 11 Process Injection | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Clipboard Data | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 11 Registry Run Keys / Startup Folder | 1 Access Token Manipulation | Security Account Manager | 1 Application Window Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Remote Access Software | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 1 DLL Side-Loading | 11 Process Injection | NTDS | 3 File and Directory Discovery | Distributed Component Object Model | Input Capture | 1 Ingress Tool Transfer | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 23 System Information Discovery | SSH | Keylogging | 2 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | 113 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | Virustotal | Browse | ||
50% | ReversingLabs | Win32.Backdoor.Remcos |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
3% | ReversingLabs | |||
50% | ReversingLabs | Win32.Backdoor.Remcos |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
subddfg.lol | 94.156.177.164 | true | true | unknown | |
healthselflesssupplies.co.za | 164.160.91.32 | true | false | unknown | |
www.healthselflesssupplies.co.za | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
94.156.177.164 | subddfg.lol | Bulgaria | 43561 | NET1-ASBG | true | |
164.160.91.32 | healthselflesssupplies.co.za | South Africa | 328037 | ElitehostZA | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1588020 |
Start date and time: | 2025-01-10 20:37:32 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 19s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 6 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | IpykYx5iwz.exerenamed because original name is a hash value |
Original Sample Name: | 5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@3/18@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target IpykYx5iwz.exe, PID 180 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
14:39:28 | API Interceptor | |
19:38:44 | Autostart | |
19:38:52 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
164.160.91.32 | Get hash | malicious | Remcos, GuLoader | Browse | ||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | Remcos, GuLoader | Browse | |||
Get hash | malicious | HTMLPhisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
subddfg.lol | Get hash | malicious | Remcos, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
NET1-ASBG | Get hash | malicious | PureLog Stealer, Quasar | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
ElitehostZA | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| |
Get hash | malicious | GuLoader | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\nsz7B51.tmp\System.dll | Get hash | malicious | XWorm | Browse | ||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | GuLoader, XWorm | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | GuLoader | Browse | |||
Get hash | malicious | FormBook, GuLoader | Browse |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 49 |
Entropy (8bit): | 4.849204231782005 |
Encrypted: | false |
SSDEEP: | 3:1ThK5AQLQIfLBJXlFGfv:1Th9QkIPeH |
MD5: | 0F375612A0BD6760193A3C4991458244 |
SHA1: | EB53D5B0A1AF8007D55B2CD5CFE59D7B71E3C45E |
SHA-256: | B4E2FF74D450A8D4FD3176A125CE941F6E6104038148AE87E01126F78904C745 |
SHA-512: | 4E760C53C1C092B634ED20CA73E7E1A5098957939A6F8E2D361316A3E65104757343DBBC1126630AAB56F06FDB080979E311C28684185FEC236438282804FC36 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 46389745 |
Entropy (8bit): | 0.2607043114540284 |
Encrypted: | false |
SSDEEP: | 6144:l91tPV4thxsoc1hW/33G8nk7ZtD0xHuGpwbRRYBr75TE+ZFoPgU3dKZheW2yF:7jUG8nxH2RRmFTE+ZFytKh |
MD5: | 08130CFCB834BC0FFE63E3334A3EC1AA |
SHA1: | 21DE65F7200E61BFAA18DE5631BAB75602375A70 |
SHA-256: | 594526843DD66FBB0CCBAE1F1A8984CBDF2DCB2AA8A15A27160F6472C2A2699F |
SHA-512: | A8D965AF77FA784E12E34F4E33D7912A88E56CF8E1590686BD99334A15F58DB78FAE49190AC22C6EDB02A91ACD7BF03AB203C25D31EF636B7A5015FF7E483ACB |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 11776 |
Entropy (8bit): | 5.854901984552606 |
Encrypted: | false |
SSDEEP: | 192:qPtkiQJr7V9r3HcU17S8g1w5xzWxy6j2V7i77blbTc4U:F7VpNo8gmOyRsVc4 |
MD5: | 0063D48AFE5A0CDC02833145667B6641 |
SHA1: | E7EB614805D183ECB1127C62DECB1A6BE1B4F7A8 |
SHA-256: | AC9DFE3B35EA4B8932536ED7406C29A432976B685CC5322F94EF93DF920FEDE7 |
SHA-512: | 71CBBCAEB345E09306E368717EA0503FE8DF485BE2E95200FEBC61BCD8BA74FB4211CD263C232F148C0123F6C6F2E3FD4EA20BDECC4070F5208C35C6920240F0 |
Malicious: | false |
Antivirus: |
|
Joe Sandbox View: |
|
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1727984 |
Entropy (8bit): | 7.996364301455999 |
Encrypted: | true |
SSDEEP: | 24576:t9tWunuwwAghUBUQyXGF8X0VMMOFdYHJStLidtLw8tWVq6VdbcGstKR18+YDQZp:NWtP4+P0Vn+dYHMwwjbV6Gst2aDQZp |
MD5: | 15214C528C41DE4D5E542EBD3D4AC075 |
SHA1: | BDAB48D323AB0E0C4689061DB5FB08ADFE1AFEC8 |
SHA-256: | 5AEB1293C473A66795BF0FF3A7892E6A6CF70AEA5248A38F204632A5FDBE1F63 |
SHA-512: | 02B6635E4F1A98765E65EE14DB0E93AB8DFDF4C7C0086ADDAD86E4A09466AE49DC66ACCDA0BC142828656FCA994EB99255EA4C762FFC9F6706410E4877CC9FC2 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 27 |
Entropy (8bit): | 4.134336113194451 |
Encrypted: | false |
SSDEEP: | 3:iGAeSMn:lAeZ |
MD5: | 7AB6006A78C23C5DEC74C202B85A51A4 |
SHA1: | C0FF9305378BE5EC16A18127C171BB9F04D5C640 |
SHA-256: | BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D |
SHA-512: | 40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\Afprikkendes.pse
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7053049 |
Entropy (8bit): | 0.15920537986619068 |
Encrypted: | false |
SSDEEP: | 768:QTcqyBjj1qaSsYNbTloIg+dMOUSFvsBxb0pPpU+ICFqCJGPPaUwoJodbe2uSS3zs:/D7Dee |
MD5: | 620747169DC6815B41CFAFBC1C63DE34 |
SHA1: | 5C4188DCD3A15D4E4A6F31A372368DF2E7E894F8 |
SHA-256: | E67B5ED0CE69F90ABBCD1D97A13B3764EE02E3CEEC7B6451D61FA5E7527376D2 |
SHA-512: | E054D5AF678EDFE95D2403D793426B0CEEE39364E44A34B28D9195C10C58031FF86E2184030357EA6CAA4530306D27C97752C1CF47C842B1DB086DE21E804470 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\Carettochelydidae.Fla
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 282409 |
Entropy (8bit): | 7.539089060973123 |
Encrypted: | false |
SSDEEP: | 6144:kV4thxsoc1hW/33G8nk7ZtD0xHuGpwbRRYV:QUG8nxH2RRI |
MD5: | 4E7C6200C8B194A91D15B4206F109CAA |
SHA1: | 0B06491801F962674178923392A59AE7943E7E00 |
SHA-256: | CA639A96999216A68DAEAB7529D09DBA8F35D4449DCD36DC036C8E8BABB3078B |
SHA-512: | 7910AE1185D498475FF78B7593C80C7D7C5F5FA51BAD0BEF40010A992FF9BF3C1982177A84588C22E0EB6525D53439540C4FC99155E3418463CB1F3FC77C8DE7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 155054 |
Entropy (8bit): | 4.606128415946002 |
Encrypted: | false |
SSDEEP: | 1536:v8/VFzzxaCNHbPfvGOm7fGZwpWYhu81CABO1UDVrUEog+AdMIqXczZgmk2m5:k7xxRTf+n+ZwXtRBO2VPg0/3m5 |
MD5: | 836B92F0A4928C14C98DF4B3FCC0797F |
SHA1: | 9D494C2D5332C4D4F799C215BD8C260A8A2D3C99 |
SHA-256: | 15014E3AD8B7297A15E47E245A02E099F0E964E64E5D64079D5E95599B9E09FB |
SHA-512: | D9D5F00FBE4BAC6F7211C6E9BCB890974D30C58C63C0284291F41AC1842FC0D4CFA69BD7987F965008142A986B858A7336A68D966F54ABCE9B2C1AD39F9D0B53 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\Unshieldable.txt
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 384 |
Entropy (8bit): | 4.181922364695503 |
Encrypted: | false |
SSDEEP: | 6:hLSQ1t70vwRiopg/iZJoLBduF00X3KA4pcW+vmQQWLUbUHrMrCK+I6MDGIU79evD:hN04RicZiLBdA4pPWLZorgZMDGIU7Mr |
MD5: | 78D840110C9709A6F508016469DB3D70 |
SHA1: | C3D13AB39B7FCEACAB772CE6E0326534C785B556 |
SHA-256: | C5B25CB253F46AA344C6543D87B93B973337D71CFE28D82F1A138E35A957F81C |
SHA-512: | C4E0526A4000EE4D477DC9E95F43CD2940C7B81E452FDEE70D08E92F3DC60356F41FD4D88FB09C8B8A5819EA930FFC339E9C18D9D3D8DCEEDE8631C5FAEA5F0D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\amorphism.rds
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2527384 |
Entropy (8bit): | 0.15771732412061856 |
Encrypted: | false |
SSDEEP: | 768:cV2EqQl1cX7MZhmJTywdQ2Z2QYnLs0H1h8OczA++COcK0GYcj9Zy3/I0kfcwlbfK:Ve |
MD5: | 1605B3CE3BC79189F8694FF97A10C5E4 |
SHA1: | B82ED5C328BDA0E88E57F3DD8075C989ECC93317 |
SHA-256: | 85BCF4761B920061E9D3451C6CAEEEFD8B9199D6B47085F461715188D9234987 |
SHA-512: | FF81B66027C077BE28D0C52D790DD230A66C0E61BA89867880C7A99294D97B60AF5822AD5FE3C6D83CB01F68D5470952C2CAC99695865FE7A34D69D2A1E08431 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 10633816 |
Entropy (8bit): | 0.15833238703625532 |
Encrypted: | false |
SSDEEP: | 768:JiH6Tc7n5/aJJ9qWS2gAuGn6ZiMCwfjh+V2yQX9daDQjdbAFrmE1vsevL9Ub1aqJ:01l16flG |
MD5: | 1F0E8B8C829457FF8BC9A6D066A67949 |
SHA1: | 7B91EF7C02E35D120729EB4E5D37CF9E72DEE466 |
SHA-256: | AE3CD420FC97538E335B7199244A8338636F647F6DB92C84B972A6817B7BE247 |
SHA-512: | 1949D2312709F465CD734AAD3FA0530C23E86C88C42A55820E4B47B61C25FAE35F94628AE174451819B74FDFBF540AF0E07D1CB69997925ADFF92A30E4854F44 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\gruffness.mis
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6456826 |
Entropy (8bit): | 0.15828912434236683 |
Encrypted: | false |
SSDEEP: | 768:eCPhDopkmPa4U2P3Uwkg5VvCU7YgRh8T8JhJC4ULpMPY8SsogMlg78dlGPg0vN1b:VW7uE89Eu |
MD5: | 1D76BAD74066C8632B985BFEF7403BA7 |
SHA1: | 3B61768A449C3D1BAE0E82DE599ADF5130917D54 |
SHA-256: | 747794579030D9280702A056DF2546FEC218D1259F268075243C1204723A91D1 |
SHA-512: | 158138DD678D437482484F1835ADFCD4349A1DDD3E7CF508A5DBACA358771069060793EF8FD5FF661D641C4EA520868B013B5B65B920A766963EED7A38C448D4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1271421 |
Entropy (8bit): | 0.15816996989165297 |
Encrypted: | false |
SSDEEP: | 768:W7rtu0KSmXSs3fA+rQ/4FkDCXMdHdyq5hDJAkKBYnDAc:t |
MD5: | 0507D743AD7E1ABA22BC2024E4813353 |
SHA1: | D89D4377D380A52492610C059AD09241A320B89B |
SHA-256: | FF629154C61F5DBC70FFA5604F7D4F0DE88A982E0E034EAA72339B5B52A92404 |
SHA-512: | 6A8C4CA920FA6D921C4D7D15A6F3A4DB19526FEC88BC1EEEE24BA0168855280A89333A49607B66009E5E95B9F099FE86752582A5F41874309110248FA4DE4D7A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6804430 |
Entropy (8bit): | 0.15943662261477257 |
Encrypted: | false |
SSDEEP: | 768:MQ/VuBzIpI4PtRMbHS+BnchAixbya9vkqNsWlP096/9WFRN8PR1nw2nVXsaNRW44:JSGMfX |
MD5: | 7C28FF654A13329CE1E20646DD23F864 |
SHA1: | 2A65BC0FC67CBEA9F59F7E315C9591711E81F235 |
SHA-256: | 9B9E25D40762E80084ED7F33A487F4948483914C91EAF903D5D82A862753A423 |
SHA-512: | 23E49F5FAACCB14895FD48A255C9632D73307492A2585B1A6881CF03ACD3D9B5E60C1351CE10CA581CDDB5C0D78D4EFF951A0275B7526850E5FB4B0442A5461A |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\udstyringsindikatoren.inw
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2599548 |
Entropy (8bit): | 0.15790946923512963 |
Encrypted: | false |
SSDEEP: | 768:J+LajrrMq9eQMzGaUk1/wd+BpREEsAWZMOo6Q991C5XhBtblZXTPA1YcF98h2218:gjW |
MD5: | 7F2BF13C70E094999CA92A423DCCDB92 |
SHA1: | 463C9E61B745CFF59DBD170780FD43B20FD43456 |
SHA-256: | 3A2304AABDE64DDBB367916594F86E9E8016A35119914FB51316BAF272B7A99B |
SHA-512: | 133952552E498A30E7CF0835851B04AF6BDED00205F18A9EEF1304AC3590621DFAD1D58D0F9C884799E8CD4874E710566099EA2047DF89FA76507030AA121839 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Acrimoniousness\understaaet.sno
Download File
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7674503 |
Entropy (8bit): | 0.159448269074076 |
Encrypted: | false |
SSDEEP: | 768:EI34KF96i325GRTHsrKRQfgBmcMbX8PQsm5BtEe3/EeIs5ywhG+ZQiA/eWi0xTmM:bGMHku0R |
MD5: | DDD9C6D20756697A879CEE4C30426407 |
SHA1: | 0D2E33372ECCBB05FA6D6DD3A1C62ACA728A192C |
SHA-256: | 9A512C11BC03FE9CD5CC0545BECBE95B7F1D915E4A9937B97AD3A0B994E555AF |
SHA-512: | 2E48D2EFEA18B27492210B36A6F19E4839CB76C5F570DBCAEC13F7C8BC360B4DAD03C309290B167DC9A984F40A113D53E726C8E4267822883B2458649723F1E6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 912531 |
Entropy (8bit): | 0.15809016661177164 |
Encrypted: | false |
SSDEEP: | 768:vGMeVeOL+VVl4PXJnMv8Myx7x0c0o3BuvUH6739vYF:9yR |
MD5: | 93B0BFEBA809AF2EF89BAE6C068BF790 |
SHA1: | 359D4F82264B813C937668E6D848F68E4A366495 |
SHA-256: | 3926FA51200C8AE3F785C31AA4E37E8AE4BB4F6CEFFB4A29B992F4B96C70E169 |
SHA-512: | 0FB853954844C20467BC56E66328DE3E1C727037747844BF21D963C467E8FDD338059BEDA350EF31B6E420A3DCB573536722BE74030935EF1E59EA93C053BDC7 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\IpykYx5iwz.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 43 |
Entropy (8bit): | 3.9834949868577314 |
Encrypted: | false |
SSDEEP: | 3:ZRADhx+DLWeaPv:ZRkk6eu |
MD5: | FF1979A4E488C54C656C860B558916BA |
SHA1: | 62DE8C42E6DBB7DF0A17638DF7E2DD69581B8B5B |
SHA-256: | 81B110E3324CA1280458B649B6D7C08FE3D4D2C1F9406E57A25A29A9E260C936 |
SHA-512: | 4F3E0371ADBB1D54ED073C6A3AF64AA1CB6ECDAAEB76ABA333114BC7D714EAEF7FE51C2A4E559907E8B2E816B46B55B8E6B1B680041BE61ADD957B1958454A96 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.996364301455999 |
TrID: |
|
File name: | IpykYx5iwz.exe |
File size: | 1'727'984 bytes |
MD5: | 15214c528c41de4d5e542ebd3d4ac075 |
SHA1: | bdab48d323ab0e0c4689061db5fb08adfe1afec8 |
SHA256: | 5aeb1293c473a66795bf0ff3a7892e6a6cf70aea5248a38f204632a5fdbe1f63 |
SHA512: | 02b6635e4f1a98765e65ee14db0e93ab8dfdf4c7c0086addad86e4a09466ae49dc66accda0bc142828656fca994eb99255ea4c762ffc9f6706410e4877cc9fc2 |
SSDEEP: | 24576:t9tWunuwwAghUBUQyXGF8X0VMMOFdYHJStLidtLw8tWVq6VdbcGstKR18+YDQZp:NWtP4+P0Vn+dYHMwwjbV6Gst2aDQZp |
TLSH: | 568533A953F00077E390263078BED454EB5D27476F63C79AF7903CB032A26964E09E7A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L......].................b...........3............@ |
Icon Hash: | 3d2e0f95332b3399 |
Entrypoint: | 0x403384 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x5DF6D4EA [Mon Dec 16 00:50:50 2019 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 7c2c71dfce9a27650634dc8b1ca03bf0 |
Signature Valid: | false |
Signature Issuer: | CN=cephalothecal, E=Smidiggrelserne@Ekstensive.bl, O=cephalothecal, L=Zadelsdorf, OU="Digestions Iongitter Ruskurser ", S=Th\xfcringen, C=DE |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 3D01B8E5D660A86142C31FA45F9D69D6 |
Thumbprint SHA-1: | 291309E43A849FEEE4744A692806BAA4ADD52E29 |
Thumbprint SHA-256: | 7B87DD29E029233FEB0E733086C7F5F73FE835AABA263F1F53EE64E1CCD16F95 |
Serial: | 2A7E1142DFD3BF677921C7FD1D5CDF39C12D8EA2 |
Instruction |
---|
sub esp, 00000184h |
push ebx |
push esi |
push edi |
xor ebx, ebx |
push 00008001h |
mov dword ptr [esp+18h], ebx |
mov dword ptr [esp+10h], 0040A130h |
mov dword ptr [esp+20h], ebx |
mov byte ptr [esp+14h], 00000020h |
call dword ptr [004080A8h] |
call dword ptr [004080A4h] |
and eax, BFFFFFFFh |
cmp ax, 00000006h |
mov dword ptr [0042472Ch], eax |
je 00007FD82486BD03h |
push ebx |
call 00007FD82486EE03h |
cmp eax, ebx |
je 00007FD82486BCF9h |
push 00000C00h |
call eax |
mov esi, 00408298h |
push esi |
call 00007FD82486ED7Fh |
push esi |
call dword ptr [004080A0h] |
lea esi, dword ptr [esi+eax+01h] |
cmp byte ptr [esi], bl |
jne 00007FD82486BCDDh |
push 0000000Ah |
call 00007FD82486EDD7h |
push 00000008h |
call 00007FD82486EDD0h |
push 00000006h |
mov dword ptr [00424724h], eax |
call 00007FD82486EDC4h |
cmp eax, ebx |
je 00007FD82486BD01h |
push 0000001Eh |
call eax |
test eax, eax |
je 00007FD82486BCF9h |
or byte ptr [0042472Fh], 00000040h |
push ebp |
call dword ptr [00408040h] |
push ebx |
call dword ptr [00408284h] |
mov dword ptr [004247F8h], eax |
push ebx |
lea eax, dword ptr [esp+38h] |
push 00000160h |
push eax |
push ebx |
push 0041FCF0h |
call dword ptr [00408178h] |
push 0040A1ECh |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x8430 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x37000 | 0xe60 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1a5688 | 0x768 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x294 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x60e4 | 0x6200 | 2af1530c9ae9afbf7316987a7849a4db | False | 0.6626275510204082 | data | 6.418841418321694 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x123e | 0x1400 | d28a5cce7e1fff61851e692820673c10 | False | 0.4283203125 | data | 5.0340602419439024 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xa000 | 0x1a838 | 0x400 | e698d830f2431b27ee24c7be8af893ba | False | 0.64453125 | data | 5.218393601728302 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x25000 | 0x12000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x37000 | 0xe60 | 0x1000 | fac1fd0c4d68005346a60e380027ba25 | False | 0.401123046875 | data | 4.031104968462267 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x37208 | 0x2e8 | Device independent bitmap graphic, 32 x 64 x 4, image size 640 | English | United States | 0.42473118279569894 |
RT_DIALOG | 0x374f0 | 0x120 | data | English | United States | 0.5104166666666666 |
RT_DIALOG | 0x37610 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x37730 | 0xc4 | data | English | United States | 0.5918367346938775 |
RT_DIALOG | 0x377f8 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x37858 | 0x14 | data | English | United States | 1.2 |
RT_VERSION | 0x37870 | 0x2ac | data | English | United States | 0.49707602339181284 |
RT_MANIFEST | 0x37b20 | 0x33e | XML 1.0 document, ASCII text, with very long lines (830), with no line terminators | English | United States | 0.5542168674698795 |
DLL | Import |
---|---|
KERNEL32.dll | SetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetFileAttributesA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileTime, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, DeleteFileA, FindFirstFileA, FindNextFileA, FindClose, SetFilePointer, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, MultiByteToWideChar, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA |
USER32.dll | GetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetForegroundWindow, ShowWindow, SetWindowLongA, SendMessageTimeoutA, FindWindowExA, IsWindow, AppendMenuA, TrackPopupMenu, CreatePopupMenu, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage |
GDI32.dll | SelectObject, SetTextColor, SetBkMode, CreateFontIndirectA, CreateBrushIndirect, DeleteObject, GetDeviceCaps, SetBkColor |
SHELL32.dll | SHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA |
ADVAPI32.dll | AdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA |
COMCTL32.dll | ImageList_Create, ImageList_AddMasked, ImageList_Destroy |
ole32.dll | OleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-10T20:38:48.834449+0100 | 2803270 | ETPRO MALWARE Common Downloader Header Pattern UHCa | 2 | 192.168.2.4 | 49736 | 164.160.91.32 | 443 | TCP |
2025-01-10T20:39:14.698396+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 49737 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:39:37.086202+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 49738 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:39:59.513567+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 49826 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:40:21.908012+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 49955 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:40:44.295391+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50009 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:06.685480+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50010 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:29.092444+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50011 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:41:51.468057+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50012 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:42:13.857616+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50013 | 94.156.177.164 | 2404 | TCP |
2025-01-10T20:42:36.234204+0100 | 2036594 | ET JA3 Hash - Remcos 3.x/4.x TLS Connection | 1 | 192.168.2.4 | 50014 | 94.156.177.164 | 2404 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 20:38:47.154145002 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:47.154198885 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:47.154306889 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:47.228058100 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:47.228087902 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.140913963 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.142216921 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:48.505548954 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:48.505583048 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.505920887 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.505966902 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:48.512171984 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:48.555336952 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.834459066 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.834522963 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:48.834538937 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:48.834578991 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.061122894 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.061137915 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.061192036 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.061222076 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.061239958 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.061274052 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.061289072 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.063118935 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.063149929 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.063179970 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.063189030 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.063231945 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.299853086 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.299880981 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.299945116 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.299959898 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.299998045 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.301505089 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.301523924 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.301614046 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.301620007 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.301661015 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.303283930 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.303299904 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.303359985 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.303365946 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.303412914 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.304595947 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.304610014 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.304691076 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.304696083 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.304847002 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.526736021 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.526762009 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.526825905 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.526842117 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.526897907 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528001070 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528017998 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528091908 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528095007 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528103113 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528146982 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528161049 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528191090 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528227091 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528521061 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528537035 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528584003 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528588057 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.528609991 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.528629065 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.531143904 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531161070 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531219959 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.531224966 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531348944 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.531810999 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531819105 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531883001 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.531888008 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.531923056 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.613042116 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.613070011 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.613173008 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.613173008 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.613183022 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.613221884 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.752898932 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.752926111 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753011942 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753011942 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753027916 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753103018 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753120899 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753184080 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753184080 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753191948 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753236055 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753408909 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753526926 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753540993 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753591061 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753607035 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753670931 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753909111 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753926992 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.753983021 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.753988028 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754065990 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754102945 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754122019 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754169941 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754169941 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754178047 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754213095 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754529953 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754545927 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754648924 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754656076 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754740953 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.754880905 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.754894018 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.755043030 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.755050898 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.755158901 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.757627010 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.757663965 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.757739067 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.757745981 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.757769108 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.757816076 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.839873075 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.839903116 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.839967966 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.839987993 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840025902 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840025902 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840043068 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840061903 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840115070 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840120077 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840245008 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840306997 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840523005 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840569019 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840596914 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840612888 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840692043 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840692043 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840820074 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840859890 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840917110 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840917110 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.840923071 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.840996027 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841067076 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841111898 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841171026 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841171026 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841176033 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841278076 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841629982 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841674089 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841698885 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841716051 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.841727972 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.841751099 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.979605913 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.979636908 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.979753017 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.979753017 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.979773998 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.979938030 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.979960918 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.979990005 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.979990005 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.979996920 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980046034 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980046034 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980290890 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980314016 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980525017 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980564117 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980564117 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980571985 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980585098 CET | 443 | 49736 | 164.160.91.32 | 192.168.2.4 |
Jan 10, 2025 20:38:49.980695009 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980695963 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:49.980726004 CET | 49736 | 443 | 192.168.2.4 | 164.160.91.32 |
Jan 10, 2025 20:38:53.310959101 CET | 49737 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:38:53.315802097 CET | 2404 | 49737 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:38:53.315892935 CET | 49737 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:38:53.319679022 CET | 49737 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:38:53.324491024 CET | 2404 | 49737 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:14.698304892 CET | 2404 | 49737 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:14.698395967 CET | 49737 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:14.698465109 CET | 49737 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:14.703330040 CET | 2404 | 49737 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:15.707643032 CET | 49738 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:15.712723970 CET | 2404 | 49738 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:15.712795019 CET | 49738 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:15.717329025 CET | 49738 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:15.722161055 CET | 2404 | 49738 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:37.086087942 CET | 2404 | 49738 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:37.086201906 CET | 49738 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:37.086276054 CET | 49738 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:37.091007948 CET | 2404 | 49738 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:38.095968962 CET | 49826 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:38.100869894 CET | 2404 | 49826 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:38.100960970 CET | 49826 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:38.104454041 CET | 49826 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:38.109217882 CET | 2404 | 49826 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:59.512006998 CET | 2404 | 49826 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:39:59.513566971 CET | 49826 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:59.513643026 CET | 49826 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:39:59.518503904 CET | 2404 | 49826 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:00.517664909 CET | 49955 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:00.522469044 CET | 2404 | 49955 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:00.522744894 CET | 49955 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:00.526304960 CET | 49955 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:00.531078100 CET | 2404 | 49955 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:21.907896996 CET | 2404 | 49955 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:21.908011913 CET | 49955 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:21.908080101 CET | 49955 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:21.912893057 CET | 2404 | 49955 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:22.924810886 CET | 50009 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:22.929706097 CET | 2404 | 50009 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:22.933455944 CET | 50009 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:22.936878920 CET | 50009 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:22.941657066 CET | 2404 | 50009 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:44.293200970 CET | 2404 | 50009 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:44.295391083 CET | 50009 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:44.295488119 CET | 50009 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:44.300246954 CET | 2404 | 50009 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:45.299139023 CET | 50010 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:45.304045916 CET | 2404 | 50010 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:40:45.304120064 CET | 50010 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:45.308459044 CET | 50010 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:40:45.313293934 CET | 2404 | 50010 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:06.684071064 CET | 2404 | 50010 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:06.685480118 CET | 50010 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:06.685673952 CET | 50010 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:06.692708015 CET | 2404 | 50010 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:07.689492941 CET | 50011 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:07.694324970 CET | 2404 | 50011 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:07.695377111 CET | 50011 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:07.698569059 CET | 50011 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:07.703351974 CET | 2404 | 50011 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:29.092255116 CET | 2404 | 50011 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:29.092443943 CET | 50011 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:29.092443943 CET | 50011 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:29.097373962 CET | 2404 | 50011 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:30.096151114 CET | 50012 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:30.101115942 CET | 2404 | 50012 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:30.105283976 CET | 50012 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:30.110301971 CET | 50012 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:30.115065098 CET | 2404 | 50012 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:51.467885971 CET | 2404 | 50012 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:51.468056917 CET | 50012 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:51.468117952 CET | 50012 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:51.473028898 CET | 2404 | 50012 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:52.470556021 CET | 50013 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:52.475625038 CET | 2404 | 50013 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:41:52.475712061 CET | 50013 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:52.479090929 CET | 50013 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:41:52.483899117 CET | 2404 | 50013 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:13.857531071 CET | 2404 | 50013 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:13.857615948 CET | 50013 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:42:13.857645035 CET | 50013 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:42:13.862519026 CET | 2404 | 50013 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:14.861068010 CET | 50014 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:42:14.866482973 CET | 2404 | 50014 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:14.867399931 CET | 50014 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:42:14.870722055 CET | 50014 | 2404 | 192.168.2.4 | 94.156.177.164 |
Jan 10, 2025 20:42:14.875561953 CET | 2404 | 50014 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:36.233961105 CET | 2404 | 50014 | 94.156.177.164 | 192.168.2.4 |
Jan 10, 2025 20:42:36.234204054 CET | 50014 | 2404 | 192.168.2.4 | 94.156.177.164 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 10, 2025 20:38:46.724633932 CET | 65523 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 20:38:47.147964001 CET | 53 | 65523 | 1.1.1.1 | 192.168.2.4 |
Jan 10, 2025 20:38:53.297907114 CET | 59263 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 10, 2025 20:38:53.310004950 CET | 53 | 59263 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 10, 2025 20:38:46.724633932 CET | 192.168.2.4 | 1.1.1.1 | 0x8415 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 10, 2025 20:38:53.297907114 CET | 192.168.2.4 | 1.1.1.1 | 0xffde | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 10, 2025 20:38:47.147964001 CET | 1.1.1.1 | 192.168.2.4 | 0x8415 | No error (0) | healthselflesssupplies.co.za | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 10, 2025 20:38:47.147964001 CET | 1.1.1.1 | 192.168.2.4 | 0x8415 | No error (0) | 164.160.91.32 | A (IP address) | IN (0x0001) | false | ||
Jan 10, 2025 20:38:53.310004950 CET | 1.1.1.1 | 192.168.2.4 | 0xffde | No error (0) | 94.156.177.164 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 164.160.91.32 | 443 | 180 | C:\Users\user\Desktop\IpykYx5iwz.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-10 19:38:48 UTC | 193 | OUT | |
2025-01-10 19:38:48 UTC | 404 | IN | |
2025-01-10 19:38:48 UTC | 964 | IN | |
2025-01-10 19:38:49 UTC | 14994 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN | |
2025-01-10 19:38:49 UTC | 16384 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:38:23 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\IpykYx5iwz.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'727'984 bytes |
MD5 hash: | 15214C528C41DE4D5E542EBD3D4AC075 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 14:38:33 |
Start date: | 10/01/2025 |
Path: | C:\Users\user\Desktop\IpykYx5iwz.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'727'984 bytes |
MD5 hash: | 15214C528C41DE4D5E542EBD3D4AC075 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 23.8% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 17.4% |
Total number of Nodes: | 1328 |
Total number of Limit Nodes: | 43 |
Graph
Function 00403384 Relevance: 89.6, APIs: 32, Strings: 19, Instructions: 366stringcomfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004053A6 Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 282windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405909 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 159filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067CD Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403CFB Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 346windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040395E Relevance: 47.5, APIs: 13, Strings: 14, Instructions: 215stringregistryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E14 Relevance: 28.2, APIs: 5, Strings: 11, Instructions: 204memoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406163 Relevance: 21.2, APIs: 7, Strings: 5, Instructions: 199stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401759 Relevance: 15.9, APIs: 5, Strings: 4, Instructions: 147stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405268 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 73stringwindowCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040646B Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040243D Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 64registrystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406028 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 44registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C02 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406E03 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B19 Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040661E Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A6C Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B8A Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AD6 Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022B2 Relevance: 4.6, APIs: 3, Instructions: 51stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004030B5 Relevance: 3.1, APIs: 2, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401389 Relevance: 3.0, APIs: 2, Instructions: 43windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401E8F Relevance: 3.0, APIs: 2, Instructions: 25COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040156F Relevance: 3.0, APIs: 2, Instructions: 23COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405CDA Relevance: 3.0, APIs: 2, Instructions: 16fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057AB Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 73402A38 Relevance: 1.6, APIs: 1, Instructions: 143COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402631 Relevance: 1.6, APIs: 1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040166A Relevance: 1.5, APIs: 1, Instructions: 38fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402363 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D52 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405D81 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 73402921 Relevance: 1.5, APIs: 1, Instructions: 21memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023A7 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040159D Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040421B Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404204 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040333C Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004041F1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404661 Relevance: 26.5, APIs: 10, Strings: 5, Instructions: 274stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402765 Relevance: 1.5, APIs: 1, Instructions: 29fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404BD4 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 489windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040433A Relevance: 38.7, APIs: 19, Strings: 3, Instructions: 202windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB0 Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 129memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404236 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404B22 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402CDD Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A18 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D41 Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C0A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405AD9 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BC7 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004051DC Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405B20 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 16stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403384 Relevance: 77.4, APIs: 32, Strings: 12, Instructions: 366stringcomfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405909 Relevance: 14.2, APIs: 7, Strings: 1, Instructions: 159filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004067CD Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004053A6 Relevance: 65.0, APIs: 36, Strings: 1, Instructions: 282windowclipboardmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404BD4 Relevance: 63.5, APIs: 33, Strings: 3, Instructions: 489windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403CFB Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 346windowstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040395E Relevance: 38.7, APIs: 13, Strings: 9, Instructions: 215stringregistryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040433A Relevance: 35.2, APIs: 19, Strings: 1, Instructions: 202windowstringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404661 Relevance: 21.3, APIs: 10, Strings: 2, Instructions: 274stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB0 Relevance: 21.1, APIs: 10, Strings: 2, Instructions: 129memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E14 Relevance: 19.5, APIs: 5, Strings: 6, Instructions: 204memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406163 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 199stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404236 Relevance: 12.1, APIs: 8, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404B22 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040646B Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 36libraryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402CDD Relevance: 10.5, APIs: 4, Strings: 2, Instructions: 36timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404A18 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 84stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401D41 Relevance: 7.6, APIs: 5, Instructions: 70windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401DFF Relevance: 7.5, APIs: 5, Instructions: 43COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401C0A Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040572E Relevance: 6.0, APIs: 4, Instructions: 39COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405BC7 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004051DC Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 46windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004057E0 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C02 Relevance: 5.2, APIs: 4, Instructions: 236COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406E03 Relevance: 5.2, APIs: 4, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B19 Relevance: 5.2, APIs: 4, Instructions: 205COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040661E Relevance: 5.2, APIs: 4, Instructions: 198COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A6C Relevance: 5.2, APIs: 4, Instructions: 180COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406B8A Relevance: 5.2, APIs: 4, Instructions: 170COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AD6 Relevance: 5.2, APIs: 4, Instructions: 168COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|