Windows
Analysis Report
Company introduction.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Company introduction.exe (PID: 7452 cmdline:
"C:\Users\ user\Deskt op\Company introduct ion.exe" MD5: 10F72E53A2C9F106093C233B56A3A819) - powershell.exe (PID: 7652 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Add-MpPref erence -Ex clusionPat h "C:\User s\user\App Data\Roami ng\FzXKnGk .exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7676 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 7948 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - schtasks.exe (PID: 7700 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\FzXK nGk" /XML "C:\Users\ user\AppDa ta\Local\T emp\tmpE62 9.tmp" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Company introduction.exe (PID: 7812 cmdline:
"C:\Users\ user\Deskt op\Company introduct ion.exe" MD5: 10F72E53A2C9F106093C233B56A3A819)
- FzXKnGk.exe (PID: 7888 cmdline:
C:\Users\u ser\AppDat a\Roaming\ FzXKnGk.ex e MD5: 10F72E53A2C9F106093C233B56A3A819) - schtasks.exe (PID: 8024 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\FzXK nGk" /XML "C:\Users\ user\AppDa ta\Local\T emp\tmpEF3 2.tmp" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 8032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - FzXKnGk.exe (PID: 8068 cmdline:
"C:\Users\ user\AppDa ta\Roaming \FzXKnGk.e xe" MD5: 10F72E53A2C9F106093C233B56A3A819) - FzXKnGk.exe (PID: 8144 cmdline:
"C:\Users\ user\AppDa ta\Roaming \FzXKnGk.e xe" MD5: 10F72E53A2C9F106093C233B56A3A819)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Email ID": "logs@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "logs@htcp.homes", "Password": "7213575aceACE@@", "Host": "mail.htcp.homes", "Port": "587", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 31 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
Click to see the 47 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:39:05.771201+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:08.006925+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:09.261798+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:10.767027+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49752 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:12.063724+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49756 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:14.296041+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49763 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:14.542062+0100 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49764 | 104.21.48.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:39:04.279464+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:05.257413+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:06.498360+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49738 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:06.607571+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:07.451354+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:08.704094+0100 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49745 | 193.122.6.168 | 80 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:39:15.625059+0100 | 1810007 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49766 | 149.154.167.220 | 443 | TCP |
2025-01-15T08:39:17.808179+0100 | 1810007 | 1 | Potentially Bad Traffic | 192.168.2.4 | 49773 | 149.154.167.220 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_07E93F5E | |
Source: | Code function: | 6_2_017DF631 | |
Source: | Code function: | 6_2_017DFA88 | |
Source: | Code function: | 6_2_05A8D9A8 | |
Source: | Code function: | 6_2_05A82DBF | |
Source: | Code function: | 6_2_05A82DC8 | |
Source: | Code function: | 6_2_05A8310E | |
Source: | Code function: | 6_2_05A82968 | |
Source: | Code function: | 6_2_05A8D550 | |
Source: | Code function: | 6_2_05A8CCA0 | |
Source: | Code function: | 6_2_05A8D0F8 | |
Source: | Code function: | 6_2_05A8F810 | |
Source: | Code function: | 6_2_05A80040 | |
Source: | Code function: | 6_2_05A80853 | |
Source: | Code function: | 6_2_05A8F3B8 | |
Source: | Code function: | 6_2_05A80B30 | |
Source: | Code function: | 6_2_05A80B30 | |
Source: | Code function: | 6_2_05A8EB08 | |
Source: | Code function: | 6_2_05A8EF60 | |
Source: | Code function: | 6_2_05A8E6B0 | |
Source: | Code function: | 6_2_05A8DE00 | |
Source: | Code function: | 6_2_05A80673 | |
Source: | Code function: | 6_2_05A8E258 | |
Source: | Code function: | 12_2_0183F631 | |
Source: | Code function: | 12_2_0183FA88 | |
Source: | Code function: | 12_2_06F60B30 | |
Source: | Code function: | 12_2_06F60B30 | |
Source: | Code function: | 12_2_06F62DC8 | |
Source: | Code function: | 12_2_06F62968 | |
Source: | Code function: | 12_2_06F6E6B0 | |
Source: | Code function: | 12_2_06F60673 | |
Source: | Code function: | 12_2_06F6E258 | |
Source: | Code function: | 12_2_06F6DE00 | |
Source: | Code function: | 12_2_06F6F3B8 | |
Source: | Code function: | 12_2_06F6EF60 | |
Source: | Code function: | 12_2_06F6EB08 | |
Source: | Code function: | 12_2_06F6D0F8 | |
Source: | Code function: | 12_2_06F6CCA0 | |
Source: | Code function: | 12_2_06F60853 | |
Source: | Code function: | 12_2_06F60040 | |
Source: | Code function: | 12_2_06F6F810 | |
Source: | Code function: | 12_2_06F6D9A8 | |
Source: | Code function: | 12_2_06F6D550 | |
Source: | Code function: | 12_2_06F6310E |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_014B4224 | |
Source: | Code function: | 0_2_014B4208 | |
Source: | Code function: | 0_2_014B7D63 | |
Source: | Code function: | 0_2_014B7D99 | |
Source: | Code function: | 0_2_07AE05B0 | |
Source: | Code function: | 0_2_07AE44C8 | |
Source: | Code function: | 0_2_07AE4088 | |
Source: | Code function: | 0_2_07AE5B30 | |
Source: | Code function: | 0_2_07AED73A | |
Source: | Code function: | 0_2_07AE4702 | |
Source: | Code function: | 0_2_07AE4710 | |
Source: | Code function: | 0_2_07AE05A0 | |
Source: | Code function: | 0_2_07AE35E8 | |
Source: | Code function: | 0_2_07AE35F8 | |
Source: | Code function: | 0_2_07AE44B8 | |
Source: | Code function: | 0_2_07AEF40A | |
Source: | Code function: | 0_2_07AEF418 | |
Source: | Code function: | 0_2_07AE23A8 | |
Source: | Code function: | 0_2_07AE23B8 | |
Source: | Code function: | 0_2_07AE63E0 | |
Source: | Code function: | 0_2_07AE63D2 | |
Source: | Code function: | 0_2_07AE5362 | |
Source: | Code function: | 0_2_07AE21C2 | |
Source: | Code function: | 0_2_07AE0011 | |
Source: | Code function: | 0_2_07AE407A | |
Source: | Code function: | 0_2_07AE0040 | |
Source: | Code function: | 0_2_07AEDFB0 | |
Source: | Code function: | 0_2_07AE2F68 | |
Source: | Code function: | 0_2_07AE2F59 | |
Source: | Code function: | 0_2_07AE4EA0 | |
Source: | Code function: | 0_2_07AE4EB0 | |
Source: | Code function: | 0_2_07AE5B22 | |
Source: | Code function: | 0_2_07AEDB68 | |
Source: | Code function: | 0_2_07AE3A81 | |
Source: | Code function: | 0_2_07AE3A90 | |
Source: | Code function: | 0_2_07AE4A68 | |
Source: | Code function: | 0_2_07AE4A58 | |
Source: | Code function: | 0_2_07AE69B8 | |
Source: | Code function: | 0_2_07AE69C8 | |
Source: | Code function: | 0_2_07AE3808 | |
Source: | Code function: | 0_2_07AE3818 | |
Source: | Code function: | 0_2_07E95F00 | |
Source: | Code function: | 0_2_07E90040 | |
Source: | Code function: | 6_2_017DC146 | |
Source: | Code function: | 6_2_017D5362 | |
Source: | Code function: | 6_2_017DD278 | |
Source: | Code function: | 6_2_017DC468 | |
Source: | Code function: | 6_2_017DC738 | |
Source: | Code function: | 6_2_017D69A0 | |
Source: | Code function: | 6_2_017DE988 | |
Source: | Code function: | 6_2_017D3B85 | |
Source: | Code function: | 6_2_017DCA08 | |
Source: | Code function: | 6_2_017D9DE0 | |
Source: | Code function: | 6_2_017DCCD8 | |
Source: | Code function: | 6_2_017D6FC8 | |
Source: | Code function: | 6_2_017DCFAA | |
Source: | Code function: | 6_2_017DF631 | |
Source: | Code function: | 6_2_017DE97A | |
Source: | Code function: | 6_2_017D29EC | |
Source: | Code function: | 6_2_017D3AA1 | |
Source: | Code function: | 6_2_017DFA88 | |
Source: | Code function: | 6_2_017D3E09 | |
Source: | Code function: | 6_2_05A89548 | |
Source: | Code function: | 6_2_05A85028 | |
Source: | Code function: | 6_2_05A89C70 | |
Source: | Code function: | 6_2_05A8D9A8 | |
Source: | Code function: | 6_2_05A8D999 | |
Source: | Code function: | 6_2_05A8DDFF | |
Source: | Code function: | 6_2_05A82968 | |
Source: | Code function: | 6_2_05A8D540 | |
Source: | Code function: | 6_2_05A8295B | |
Source: | Code function: | 6_2_05A8D550 | |
Source: | Code function: | 6_2_05A8CCA0 | |
Source: | Code function: | 6_2_05A8D0F8 | |
Source: | Code function: | 6_2_05A8F803 | |
Source: | Code function: | 6_2_05A80006 | |
Source: | Code function: | 6_2_05A85018 | |
Source: | Code function: | 6_2_05A8F810 | |
Source: | Code function: | 6_2_05A8FC68 | |
Source: | Code function: | 6_2_05A89C63 | |
Source: | Code function: | 6_2_05A80040 | |
Source: | Code function: | 6_2_05A8F3A8 | |
Source: | Code function: | 6_2_05A817A0 | |
Source: | Code function: | 6_2_05A88BA0 | |
Source: | Code function: | 6_2_05A8F3B8 | |
Source: | Code function: | 6_2_05A8178F | |
Source: | Code function: | 6_2_05A88B90 | |
Source: | Code function: | 6_2_05A89328 | |
Source: | Code function: | 6_2_05A80B20 | |
Source: | Code function: | 6_2_05A80B30 | |
Source: | Code function: | 6_2_05A8EB08 | |
Source: | Code function: | 6_2_05A8EF60 | |
Source: | Code function: | 6_2_05A8EF51 | |
Source: | Code function: | 6_2_05A8E6AF | |
Source: | Code function: | 6_2_05A8E6B0 | |
Source: | Code function: | 6_2_05A81E80 | |
Source: | Code function: | 6_2_05A8EAF8 | |
Source: | Code function: | 6_2_05A8DE00 | |
Source: | Code function: | 6_2_05A81E70 | |
Source: | Code function: | 6_2_05A8E24B | |
Source: | Code function: | 6_2_05A8E258 | |
Source: | Code function: | 7_2_00DB4224 | |
Source: | Code function: | 7_2_00DB4208 | |
Source: | Code function: | 7_2_00DB4B89 | |
Source: | Code function: | 7_2_00DB7D98 | |
Source: | Code function: | 7_2_00DB7D62 | |
Source: | Code function: | 7_2_029480B8 | |
Source: | Code function: | 7_2_0294F400 | |
Source: | Code function: | 7_2_0294FB58 | |
Source: | Code function: | 7_2_0294E8C1 | |
Source: | Code function: | 7_2_029412F8 | |
Source: | Code function: | 7_2_0294F3F1 | |
Source: | Code function: | 7_2_029485B2 | |
Source: | Code function: | 7_2_06EE44C8 | |
Source: | Code function: | 7_2_06EE05B0 | |
Source: | Code function: | 7_2_06EE4088 | |
Source: | Code function: | 7_2_06EE5B30 | |
Source: | Code function: | 7_2_06EED73A | |
Source: | Code function: | 7_2_06EE4703 | |
Source: | Code function: | 7_2_06EE4710 | |
Source: | Code function: | 7_2_06EE44B8 | |
Source: | Code function: | 7_2_06EEF40A | |
Source: | Code function: | 7_2_06EEF418 | |
Source: | Code function: | 7_2_06EE35E8 | |
Source: | Code function: | 7_2_06EE35F8 | |
Source: | Code function: | 7_2_06EE05A0 | |
Source: | Code function: | 7_2_06EE63E0 | |
Source: | Code function: | 7_2_06EE63D1 | |
Source: | Code function: | 7_2_06EE23A8 | |
Source: | Code function: | 7_2_06EE23B8 | |
Source: | Code function: | 7_2_06EE5363 | |
Source: | Code function: | 7_2_06EE407B | |
Source: | Code function: | 7_2_06EE0040 | |
Source: | Code function: | 7_2_06EE0006 | |
Source: | Code function: | 7_2_06EE21C3 | |
Source: | Code function: | 7_2_06EE4EA0 | |
Source: | Code function: | 7_2_06EE4EB0 | |
Source: | Code function: | 7_2_06EEDFB0 | |
Source: | Code function: | 7_2_06EE2F68 | |
Source: | Code function: | 7_2_06EE2F59 | |
Source: | Code function: | 7_2_06EE3A81 | |
Source: | Code function: | 7_2_06EE3A90 | |
Source: | Code function: | 7_2_06EE4A68 | |
Source: | Code function: | 7_2_06EE4A58 | |
Source: | Code function: | 7_2_06EEDB68 | |
Source: | Code function: | 7_2_06EE5B23 | |
Source: | Code function: | 7_2_06EE3808 | |
Source: | Code function: | 7_2_06EE3818 | |
Source: | Code function: | 7_2_06EE69C8 | |
Source: | Code function: | 7_2_06EE69B8 | |
Source: | Code function: | 12_2_0183C147 | |
Source: | Code function: | 12_2_01835362 | |
Source: | Code function: | 12_2_0183D278 | |
Source: | Code function: | 12_2_0183C468 | |
Source: | Code function: | 12_2_0183C738 | |
Source: | Code function: | 12_2_0183F631 | |
Source: | Code function: | 12_2_0183E988 | |
Source: | Code function: | 12_2_018369A0 | |
Source: | Code function: | 12_2_0183CA08 | |
Source: | Code function: | 12_2_01839DE0 | |
Source: | Code function: | 12_2_0183CCD8 | |
Source: | Code function: | 12_2_0183CFAB | |
Source: | Code function: | 12_2_01836FC8 | |
Source: | Code function: | 12_2_018329E0 | |
Source: | Code function: | 12_2_0183E97B | |
Source: | Code function: | 12_2_0183FA88 | |
Source: | Code function: | 12_2_06F61E80 | |
Source: | Code function: | 12_2_06F617A0 | |
Source: | Code function: | 12_2_06F60B30 | |
Source: | Code function: | 12_2_06F69C70 | |
Source: | Code function: | 12_2_06F65028 | |
Source: | Code function: | 12_2_06F62968 | |
Source: | Code function: | 12_2_06F69548 | |
Source: | Code function: | 12_2_06F6EAF8 | |
Source: | Code function: | 12_2_06F6E6B0 | |
Source: | Code function: | 12_2_06F6E6AF | |
Source: | Code function: | 12_2_06F61E70 | |
Source: | Code function: | 12_2_06F6E258 | |
Source: | Code function: | 12_2_06F6E249 | |
Source: | Code function: | 12_2_06F6DE00 | |
Source: | Code function: | 12_2_06F6F3B8 | |
Source: | Code function: | 12_2_06F68BA0 | |
Source: | Code function: | 12_2_06F6178F | |
Source: | Code function: | 12_2_06F6EF60 | |
Source: | Code function: | 12_2_06F6EF51 | |
Source: | Code function: | 12_2_06F60B20 | |
Source: | Code function: | 12_2_06F6EB08 | |
Source: | Code function: | 12_2_06F6D0F8 | |
Source: | Code function: | 12_2_06F6CCA0 | |
Source: | Code function: | 12_2_06F69C6D | |
Source: | Code function: | 12_2_06F6FC68 | |
Source: | Code function: | 12_2_06F6FC5E | |
Source: | Code function: | 12_2_06F60040 | |
Source: | Code function: | 12_2_06F6F810 | |
Source: | Code function: | 12_2_06F65018 | |
Source: | Code function: | 12_2_06F60007 | |
Source: | Code function: | 12_2_06F6F801 | |
Source: | Code function: | 12_2_06F6DDFF | |
Source: | Code function: | 12_2_06F6D9A8 | |
Source: | Code function: | 12_2_06F6D999 | |
Source: | Code function: | 12_2_06F6D550 | |
Source: | Code function: | 12_2_06F6D540 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 6_2_017D9D55 | |
Source: | Code function: | 7_2_0294EBFC | |
Source: | Code function: | 7_2_06EE72A1 | |
Source: | Code function: | 12_2_01839D55 | |
Source: | Code function: | 12_2_06F69244 | |
Source: | Code function: | 12_2_06F62DC1 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | |||
Source: | Registry key monitored for changes: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | |||
Source: | Window / User API: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 6_2_05A89548 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | File opened: | |||
Source: | Key opened: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 111 Process Injection | 1 Masquerading | 1 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Email Collection | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 11 Disable or Modify Tools | LSASS Memory | 11 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 31 Virtualization/Sandbox Evasion | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 1 Data from Local System | 3 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 31 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 2 Software Packing | Cached Domain Credentials | 1 System Network Configuration Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 1 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 13 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
29% | Virustotal | Browse | ||
34% | ReversingLabs | |||
100% | Avira | HEUR/AGEN.1311126 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1311126 | ||
100% | Joe Sandbox ML | |||
34% | ReversingLabs | |||
29% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
reallyfreegeoip.org | 104.21.48.1 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high | |
checkip.dyndns.com | 193.122.6.168 | true | false | high | |
checkip.dyndns.org | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.48.1 | reallyfreegeoip.org | United States | 13335 | CLOUDFLARENETUS | false | |
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
193.122.6.168 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false |
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1591636 |
Start date and time: | 2025-01-15 08:38:07 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 5s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Company introduction.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@18/11@3/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 184.28.90.27, 4.245.163.56, 13.107.253.45
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
Time | Type | Description |
---|---|---|
02:39:00 | API Interceptor | |
02:39:02 | API Interceptor | |
02:39:03 | API Interceptor | |
07:39:02 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.48.1 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | CMSBrute | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
149.154.167.220 | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | ||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
193.122.6.168 | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
checkip.dyndns.com | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
reallyfreegeoip.org | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
api.telegram.org | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ORACLE-BMC-31898US | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
TELEGRAMRU | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | DBatLoader, PureLog Stealer, Snake Keylogger, VIP Keylogger | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | AgentTesla | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Wannacry | Browse |
| ||
Get hash | malicious | Virut, Wannacry | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Telegram Phisher | Browse |
|
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Company introduction.exe.log
Download File
Process: | C:\Users\user\Desktop\Company introduction.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2232 |
Entropy (8bit): | 5.379460230152629 |
Encrypted: | false |
SSDEEP: | 48:fWSU4y4RQmFoUeWmfgZ9tK8NPZHUm7u1iMuge//Z8vUyus:fLHyIFKL3IZ2KRH9Ouggs |
MD5: | 5F355422EC7EF08609CC91728781B675 |
SHA1: | EC2F98559C8DCCD7B3D9454618E092E6993632DF |
SHA-256: | 5531100331171995A90752EE94B34BBE5DBDD7BCCD4B8530C1D9C77404E8CC9C |
SHA-512: | 90CD74FEEA54C9A8FA1EDB2B46DDCBC8640F1573064A4F2A147E1BE04AFE84F6F77ADBB98CD108A55ED21E740726911D2196B716B48C2D6EAE93BFF936BA8CBE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Company introduction.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1573 |
Entropy (8bit): | 5.119400958992196 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaC5xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTfvv |
MD5: | 3A871C4D57EF4E7719A1D1A7FCD88A2C |
SHA1: | 6554BD589332C5B53C450A1763DB4D59506BC304 |
SHA-256: | E454E384C15743002C76A1A26BF95816529A57501FE4300C50390549FB71A07F |
SHA-512: | E83716CAA579DA5A7EDAF945A90479C2A8102DE860799934785B44D3775D71B99E25755F07F354758B149730C3C7424A9E162C63AC655B9AC6B25B25D616BE92 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1573 |
Entropy (8bit): | 5.119400958992196 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaC5xvn:cge1wYrFdOFzOzN33ODOiDdKrsuTfvv |
MD5: | 3A871C4D57EF4E7719A1D1A7FCD88A2C |
SHA1: | 6554BD589332C5B53C450A1763DB4D59506BC304 |
SHA-256: | E454E384C15743002C76A1A26BF95816529A57501FE4300C50390549FB71A07F |
SHA-512: | E83716CAA579DA5A7EDAF945A90479C2A8102DE860799934785B44D3775D71B99E25755F07F354758B149730C3C7424A9E162C63AC655B9AC6B25B25D616BE92 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Company introduction.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 854528 |
Entropy (8bit): | 7.674812972167672 |
Encrypted: | false |
SSDEEP: | 24576:XsJN+UVsa/olYFjQyPIoqtpGFjcrpTZ6q6U7jbHXM:83+UfxFsyPIoqcETHFXX |
MD5: | 10F72E53A2C9F106093C233B56A3A819 |
SHA1: | E8A63836FF90493559B69A1BC6D6080BA9370A99 |
SHA-256: | 84E892D4627A3A3AA053B30200788BD6942C046D2DADCF5121017A32E10142F2 |
SHA-512: | CD83C1B9C6128B852F36F97A387C4C89B781F0B0B52702540B12C5878129A0352C3EDC2C12E2FB13E8F159256272338833715C3D78D98C4A195B8E50BD1EBCE2 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\Company introduction.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 7.674812972167672 |
TrID: |
|
File name: | Company introduction.exe |
File size: | 854'528 bytes |
MD5: | 10f72e53a2c9f106093c233b56a3a819 |
SHA1: | e8a63836ff90493559b69a1bc6d6080ba9370a99 |
SHA256: | 84e892d4627a3a3aa053b30200788bd6942c046d2dadcf5121017a32e10142f2 |
SHA512: | cd83c1b9c6128b852f36f97a387c4c89b781f0b0b52702540b12c5878129a0352c3edc2c12e2fb13e8f159256272338833715c3d78d98c4a195b8e50bd1ebce2 |
SSDEEP: | 24576:XsJN+UVsa/olYFjQyPIoqtpGFjcrpTZ6q6U7jbHXM:83+UfxFsyPIoqcETHFXX |
TLSH: | 7205D0C03B2A7311DDACBA34853BDDB9A2642D38B00479E26EDD2B5776DD1039A1CF45 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0.............2.... ... ....@.. .......................`............@................................ |
Icon Hash: | 0066b49631f8dc38 |
Entrypoint: | 0x4d1032 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67871BE8 [Wed Jan 15 02:22:32 2025 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
lodsd |
fiadd word ptr [eax] |
add bh, ch |
mov esi, CAFE0000h |
add byte ptr [eax], al |
mov esi, 000000BAh |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd0fe0 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xd2000 | 0x126c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xd4000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xcf048 | 0xcf200 | 4821f738bd26c6e31e04e0b0d037e9eb | False | 0.8769696269613759 | data | 7.681146035096391 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xd2000 | 0x126c | 0x1400 | dada842701f0d675dbc615b6d00973e9 | False | 0.7080078125 | data | 6.393064731157026 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xd4000 | 0xc | 0x200 | abb73554162131666411a8df5fbbc290 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xd2100 | 0xbdf | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | 0.9348469891411648 | ||
RT_GROUP_ICON | 0xd2cf0 | 0x14 | data | 1.05 | ||
RT_VERSION | 0xd2d14 | 0x358 | data | 0.4287383177570093 | ||
RT_MANIFEST | 0xd307c | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-15T08:39:04.279464+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:05.257413+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:05.771201+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49735 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:06.498360+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49738 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:06.607571+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:07.451354+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:08.006925+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49743 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:08.704094+0100 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49745 | 193.122.6.168 | 80 | TCP |
2025-01-15T08:39:09.261798+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49747 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:10.767027+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49752 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:12.063724+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49756 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:14.296041+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49763 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:14.542062+0100 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49764 | 104.21.48.1 | 443 | TCP |
2025-01-15T08:39:15.625059+0100 | 1810007 | Joe Security ANOMALY Telegram Send Message | 1 | 192.168.2.4 | 49766 | 149.154.167.220 | 443 | TCP |
2025-01-15T08:39:17.808179+0100 | 1810007 | Joe Security ANOMALY Telegram Send Message | 1 | 192.168.2.4 | 49773 | 149.154.167.220 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 08:39:03.347352028 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:03.352174044 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:03.352293015 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:03.352514029 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:03.357280016 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:03.979095936 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:03.991544962 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:03.996412992 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:04.177424908 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:04.234563112 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.234652996 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.235274076 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.257548094 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.257581949 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.279464006 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:04.738928080 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.739021063 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.744255066 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.744307995 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.744805098 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.837207079 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.883341074 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.947345018 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.947501898 CET | 443 | 49734 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.947563887 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.953680992 CET | 49734 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:04.957642078 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:04.962450981 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.144056082 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.146735907 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.146770954 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.146847010 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.147069931 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.147082090 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.257412910 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.627742052 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.629476070 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.629494905 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.681332111 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.686306000 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.686376095 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.691999912 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.696757078 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.771375895 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.771519899 CET | 443 | 49735 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:05.771701097 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.772100925 CET | 49735 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:05.775768042 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.777059078 CET | 49738 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.780679941 CET | 80 | 49733 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.780742884 CET | 49733 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.781913042 CET | 80 | 49738 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:05.781994104 CET | 49738 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.782098055 CET | 49738 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:05.786833048 CET | 80 | 49738 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:06.312624931 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:06.316016912 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:06.320847988 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:06.408117056 CET | 80 | 49738 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:06.409535885 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.409588099 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:06.409663916 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.409971952 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.409996033 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:06.498359919 CET | 49738 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:06.501981020 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:06.540460110 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.540509939 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:06.540585041 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.544745922 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.544764996 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:06.607570887 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:06.879595041 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:06.881675005 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:06.881705999 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.014489889 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.014605999 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.015917063 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.015944958 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.017153978 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.022965908 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.023116112 CET | 443 | 49740 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.023226976 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.023520947 CET | 49740 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.028381109 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.033152103 CET | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:07.033409119 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.033612013 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.038358927 CET | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:07.091975927 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.114553928 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.155366898 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.218830109 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.218977928 CET | 443 | 49741 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.219049931 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.221389055 CET | 49741 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.225227118 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.230093956 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:07.410420895 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:07.414206982 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.414273977 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.414346933 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.414882898 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.414917946 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.451354027 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.667814970 CET | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:07.669457912 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.669502020 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.669557095 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.669836998 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.669845104 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.716958046 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:07.893307924 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:07.895109892 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:07.895190001 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.006998062 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.007184029 CET | 443 | 49743 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.007237911 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.007622004 CET | 49743 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.011071920 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.012379885 CET | 49745 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.015991926 CET | 80 | 49737 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.016037941 CET | 49737 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.017214060 CET | 80 | 49745 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.017287016 CET | 49745 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.017352104 CET | 49745 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.022181988 CET | 80 | 49745 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.131972075 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.133860111 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.133898973 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.280589104 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.280750036 CET | 443 | 49744 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.280919075 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.283977032 CET | 49744 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.284686089 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.285794973 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.289814949 CET | 80 | 49742 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.289941072 CET | 49742 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.290616035 CET | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.290771961 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.290771961 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.295557022 CET | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.652220964 CET | 80 | 49745 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.653959036 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.654038906 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.654453993 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.655145884 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.655194998 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.704093933 CET | 49745 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:08.917781115 CET | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:08.919297934 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.919359922 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.919569016 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.919796944 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:08.919811964 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:08.967004061 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.114896059 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.116440058 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.116497040 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.261903048 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.262048960 CET | 443 | 49747 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.262137890 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.262597084 CET | 49747 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.267399073 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.272267103 CET | 80 | 49749 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.272422075 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.272509098 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.277319908 CET | 80 | 49749 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.382091045 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.383681059 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.383765936 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.512403011 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.512572050 CET | 443 | 49748 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.512648106 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.512984037 CET | 49748 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.518853903 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.520057917 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.523864985 CET | 80 | 49746 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.523947001 CET | 49746 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.524903059 CET | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.524981022 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.525104046 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:09.529843092 CET | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.906088114 CET | 80 | 49749 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:09.907455921 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.907514095 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.907663107 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.907923937 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:09.907954931 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:09.951343060 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.149517059 CET | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.151324987 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.151391029 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.151473999 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.151765108 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.151777983 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.201339006 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.378037930 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.379661083 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.379688978 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.512970924 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.513184071 CET | 443 | 49751 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.513240099 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.513586044 CET | 49751 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.518037081 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.519304991 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.523041964 CET | 80 | 49749 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.523102045 CET | 49749 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.524249077 CET | 80 | 49753 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.524331093 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.524418116 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.529310942 CET | 80 | 49753 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.633390903 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.635075092 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.635157108 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.767107964 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.767307997 CET | 443 | 49752 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:10.767484903 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.767942905 CET | 49752 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:10.772196054 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.773442984 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.777388096 CET | 80 | 49750 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.777453899 CET | 49750 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.778414965 CET | 80 | 49754 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:10.778508902 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.778608084 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:10.783379078 CET | 80 | 49754 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.158901930 CET | 80 | 49753 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.160110950 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.160204887 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.160284042 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.160732985 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.160813093 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.201514959 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.401498079 CET | 80 | 49754 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.451370955 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.463088036 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.463145018 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.463211060 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.463622093 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.463643074 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.628978968 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.643754959 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.643840075 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.777653933 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.777807951 CET | 443 | 49755 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.778132915 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.778383017 CET | 49755 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.782500982 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.782990932 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.787632942 CET | 80 | 49753 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.787810087 CET | 49753 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.788017035 CET | 80 | 49757 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.788137913 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.788259983 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:11.793123960 CET | 80 | 49757 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:11.918021917 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:11.923063040 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:11.923086882 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.063730001 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.063786983 CET | 443 | 49756 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.063853979 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.064451933 CET | 49756 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.068687916 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.069870949 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.073748112 CET | 80 | 49754 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:12.073807955 CET | 49754 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.074863911 CET | 80 | 49758 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:12.074955940 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.075045109 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.079965115 CET | 80 | 49758 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:12.423669100 CET | 80 | 49757 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:12.425014019 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.425117016 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.425204992 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.425482988 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.425518990 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.466979980 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.706100941 CET | 80 | 49758 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:12.707582951 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.707684994 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.707766056 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.708045959 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.708070040 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.748223066 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:12.894571066 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:12.896445990 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:12.896528959 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.009107113 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.009274960 CET | 443 | 49759 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.009454012 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.009799004 CET | 49759 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.014468908 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.016242027 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.019567013 CET | 80 | 49757 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.019634008 CET | 49757 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.021217108 CET | 80 | 49761 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.021287918 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.021369934 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.026191950 CET | 80 | 49761 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.189579964 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.190988064 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.191046953 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.328200102 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.328284979 CET | 443 | 49760 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.328589916 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.328695059 CET | 49760 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.332065105 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.333050966 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.337116003 CET | 80 | 49758 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.337186098 CET | 49758 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.338001966 CET | 80 | 49762 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.338073969 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.338157892 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.343153000 CET | 80 | 49762 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.647267103 CET | 80 | 49761 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.671461105 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.671551943 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.671695948 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.672178984 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.672215939 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.701370001 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:13.967593908 CET | 80 | 49762 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:13.969288111 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.969383955 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:13.969490051 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.969944954 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:13.969981909 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.013938904 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.149068117 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.150962114 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.151047945 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.296041012 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.296125889 CET | 443 | 49763 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.296205997 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.312596083 CET | 49763 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.360457897 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.361495018 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.366288900 CET | 80 | 49765 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:14.366380930 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.367685080 CET | 80 | 49761 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:14.367758989 CET | 49761 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.424242020 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.434523106 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.434580088 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.442634106 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.447487116 CET | 80 | 49765 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:14.542064905 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.542144060 CET | 443 | 49764 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.542193890 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.542912960 CET | 49764 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:14.736341000 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.741529942 CET | 80 | 49762 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:14.741599083 CET | 49762 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:14.743679047 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:14.743726015 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:14.743782997 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:14.744441986 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:14.744467020 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:14.999947071 CET | 80 | 49765 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:15.001471043 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.001516104 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.001575947 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.001904964 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.001921892 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.045125961 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.383326054 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.383440971 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:15.386177063 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:15.386203051 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.386636019 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.388571978 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:15.435349941 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.459842920 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.462754011 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.462774992 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.605343103 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.605403900 CET | 443 | 49767 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:15.605588913 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.606338024 CET | 49767 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:15.611936092 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.612059116 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.616844893 CET | 80 | 49769 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:15.617036104 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.617134094 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.617321968 CET | 80 | 49765 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:15.620997906 CET | 49765 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:15.621965885 CET | 80 | 49769 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:15.625099897 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.625180006 CET | 443 | 49766 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:15.625262976 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:15.632951021 CET | 49766 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:16.274338007 CET | 80 | 49769 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:16.276129961 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.276228905 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.276320934 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.276633978 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.276671886 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.326411963 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:16.753818035 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.755830050 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.755858898 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.890670061 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.890865088 CET | 443 | 49770 | 104.21.48.1 | 192.168.2.4 |
Jan 15, 2025 08:39:16.890986919 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.891935110 CET | 49770 | 443 | 192.168.2.4 | 104.21.48.1 |
Jan 15, 2025 08:39:16.920808077 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:16.926021099 CET | 80 | 49769 | 193.122.6.168 | 192.168.2.4 |
Jan 15, 2025 08:39:16.926264048 CET | 49769 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:16.927175045 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:16.927268982 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:16.928174019 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:16.928612947 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:16.928669930 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.564191103 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.564307928 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:17.589514971 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:17.589560032 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.589965105 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.610655069 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:17.655340910 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.808172941 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.808254004 CET | 443 | 49773 | 149.154.167.220 | 192.168.2.4 |
Jan 15, 2025 08:39:17.808362961 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:17.836663008 CET | 49773 | 443 | 192.168.2.4 | 149.154.167.220 |
Jan 15, 2025 08:39:32.054512978 CET | 49738 | 80 | 192.168.2.4 | 193.122.6.168 |
Jan 15, 2025 08:39:34.231540918 CET | 49745 | 80 | 192.168.2.4 | 193.122.6.168 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 15, 2025 08:39:03.333297968 CET | 58540 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 08:39:03.340167999 CET | 53 | 58540 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 08:39:04.226078033 CET | 49542 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 08:39:04.233692884 CET | 53 | 49542 | 1.1.1.1 | 192.168.2.4 |
Jan 15, 2025 08:39:14.735824108 CET | 60150 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 15, 2025 08:39:14.742846966 CET | 53 | 60150 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 15, 2025 08:39:03.333297968 CET | 192.168.2.4 | 1.1.1.1 | 0x5372 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 08:39:04.226078033 CET | 192.168.2.4 | 1.1.1.1 | 0xf293 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 15, 2025 08:39:14.735824108 CET | 192.168.2.4 | 1.1.1.1 | 0x5849 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:03.340167999 CET | 1.1.1.1 | 192.168.2.4 | 0x5372 | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:04.233692884 CET | 1.1.1.1 | 192.168.2.4 | 0xf293 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Jan 15, 2025 08:39:14.742846966 CET | 1.1.1.1 | 192.168.2.4 | 0x5849 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49733 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:03.352514029 CET | 151 | OUT | |
Jan 15, 2025 08:39:03.979095936 CET | 273 | IN | |
Jan 15, 2025 08:39:03.991544962 CET | 127 | OUT | |
Jan 15, 2025 08:39:04.177424908 CET | 273 | IN | |
Jan 15, 2025 08:39:04.957642078 CET | 127 | OUT | |
Jan 15, 2025 08:39:05.144056082 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49737 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:05.691999912 CET | 151 | OUT | |
Jan 15, 2025 08:39:06.312624931 CET | 273 | IN | |
Jan 15, 2025 08:39:06.316016912 CET | 127 | OUT | |
Jan 15, 2025 08:39:06.501981020 CET | 273 | IN | |
Jan 15, 2025 08:39:07.225227118 CET | 127 | OUT | |
Jan 15, 2025 08:39:07.410420895 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49738 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:05.782098055 CET | 127 | OUT | |
Jan 15, 2025 08:39:06.408117056 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49742 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:07.033612013 CET | 151 | OUT | |
Jan 15, 2025 08:39:07.667814970 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49745 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:08.017352104 CET | 127 | OUT | |
Jan 15, 2025 08:39:08.652220964 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49746 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:08.290771961 CET | 151 | OUT | |
Jan 15, 2025 08:39:08.917781115 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49749 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:09.272509098 CET | 151 | OUT | |
Jan 15, 2025 08:39:09.906088114 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49750 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:09.525104046 CET | 151 | OUT | |
Jan 15, 2025 08:39:10.149517059 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49753 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:10.524418116 CET | 151 | OUT | |
Jan 15, 2025 08:39:11.158901930 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49754 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:10.778608084 CET | 151 | OUT | |
Jan 15, 2025 08:39:11.401498079 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49757 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:11.788259983 CET | 151 | OUT | |
Jan 15, 2025 08:39:12.423669100 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.4 | 49758 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:12.075045109 CET | 151 | OUT | |
Jan 15, 2025 08:39:12.706100941 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.4 | 49761 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:13.021369934 CET | 151 | OUT | |
Jan 15, 2025 08:39:13.647267103 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.4 | 49762 | 193.122.6.168 | 80 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:13.338157892 CET | 151 | OUT | |
Jan 15, 2025 08:39:13.967593908 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
14 | 192.168.2.4 | 49765 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:14.442634106 CET | 151 | OUT | |
Jan 15, 2025 08:39:14.999947071 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
15 | 192.168.2.4 | 49769 | 193.122.6.168 | 80 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Jan 15, 2025 08:39:15.617134094 CET | 151 | OUT | |
Jan 15, 2025 08:39:16.274338007 CET | 273 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49734 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:04 UTC | 85 | OUT | |
2025-01-15 07:39:04 UTC | 855 | IN | |
2025-01-15 07:39:04 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49735 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:05 UTC | 61 | OUT | |
2025-01-15 07:39:05 UTC | 863 | IN | |
2025-01-15 07:39:05 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:06 UTC | 85 | OUT | |
2025-01-15 07:39:07 UTC | 863 | IN | |
2025-01-15 07:39:07 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:07 UTC | 85 | OUT | |
2025-01-15 07:39:07 UTC | 857 | IN | |
2025-01-15 07:39:07 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49743 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:07 UTC | 61 | OUT | |
2025-01-15 07:39:08 UTC | 855 | IN | |
2025-01-15 07:39:08 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49744 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:08 UTC | 85 | OUT | |
2025-01-15 07:39:08 UTC | 867 | IN | |
2025-01-15 07:39:08 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49747 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:09 UTC | 61 | OUT | |
2025-01-15 07:39:09 UTC | 857 | IN | |
2025-01-15 07:39:09 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49748 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:09 UTC | 85 | OUT | |
2025-01-15 07:39:09 UTC | 855 | IN | |
2025-01-15 07:39:09 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49751 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:10 UTC | 85 | OUT | |
2025-01-15 07:39:10 UTC | 855 | IN | |
2025-01-15 07:39:10 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49752 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:10 UTC | 61 | OUT | |
2025-01-15 07:39:10 UTC | 853 | IN | |
2025-01-15 07:39:10 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49755 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:11 UTC | 85 | OUT | |
2025-01-15 07:39:11 UTC | 855 | IN | |
2025-01-15 07:39:11 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.4 | 49756 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:11 UTC | 61 | OUT | |
2025-01-15 07:39:12 UTC | 853 | IN | |
2025-01-15 07:39:12 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.4 | 49759 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:12 UTC | 85 | OUT | |
2025-01-15 07:39:13 UTC | 861 | IN | |
2025-01-15 07:39:13 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.4 | 49760 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:13 UTC | 85 | OUT | |
2025-01-15 07:39:13 UTC | 853 | IN | |
2025-01-15 07:39:13 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
14 | 192.168.2.4 | 49763 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:14 UTC | 61 | OUT | |
2025-01-15 07:39:14 UTC | 855 | IN | |
2025-01-15 07:39:14 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
15 | 192.168.2.4 | 49764 | 104.21.48.1 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:14 UTC | 61 | OUT | |
2025-01-15 07:39:14 UTC | 863 | IN | |
2025-01-15 07:39:14 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
16 | 192.168.2.4 | 49766 | 149.154.167.220 | 443 | 7812 | C:\Users\user\Desktop\Company introduction.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:15 UTC | 349 | OUT | |
2025-01-15 07:39:15 UTC | 344 | IN | |
2025-01-15 07:39:15 UTC | 55 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
17 | 192.168.2.4 | 49767 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:15 UTC | 85 | OUT | |
2025-01-15 07:39:15 UTC | 857 | IN | |
2025-01-15 07:39:15 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
18 | 192.168.2.4 | 49770 | 104.21.48.1 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:16 UTC | 85 | OUT | |
2025-01-15 07:39:16 UTC | 865 | IN | |
2025-01-15 07:39:16 UTC | 362 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
19 | 192.168.2.4 | 49773 | 149.154.167.220 | 443 | 8144 | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-15 07:39:17 UTC | 349 | OUT | |
2025-01-15 07:39:17 UTC | 344 | IN | |
2025-01-15 07:39:17 UTC | 55 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 02:38:58 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Company introduction.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xda0000 |
File size: | 854'528 bytes |
MD5 hash: | 10F72E53A2C9F106093C233B56A3A819 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 02:39:00 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc90000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 02:39:01 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 02:39:01 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb00000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 02:39:01 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 02:39:01 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\Desktop\Company introduction.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xbc0000 |
File size: | 854'528 bytes |
MD5 hash: | 10F72E53A2C9F106093C233B56A3A819 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 7 |
Start time: | 02:39:02 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x2d0000 |
File size: | 854'528 bytes |
MD5 hash: | 10F72E53A2C9F106093C233B56A3A819 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 8 |
Start time: | 02:39:03 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\wbem\WmiPrvSE.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff693ab0000 |
File size: | 496'640 bytes |
MD5 hash: | 60FF40CFD7FB8FE41EE4FE9AE5FE1C51 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 02:39:03 |
Start date: | 15/01/2025 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb00000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 02:39:03 |
Start date: | 15/01/2025 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 02:39:04 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x1d0000 |
File size: | 854'528 bytes |
MD5 hash: | 10F72E53A2C9F106093C233B56A3A819 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 12 |
Start time: | 02:39:04 |
Start date: | 15/01/2025 |
Path: | C:\Users\user\AppData\Roaming\FzXKnGk.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xed0000 |
File size: | 854'528 bytes |
MD5 hash: | 10F72E53A2C9F106093C233B56A3A819 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 12.2% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 3.9% |
Total number of Nodes: | 232 |
Total number of Limit Nodes: | 12 |
Graph
Function 014B4208 Relevance: 3.1, Strings: 2, Instructions: 588COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014B7D63 Relevance: 3.1, Strings: 2, Instructions: 581COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014B4224 Relevance: 3.1, Strings: 2, Instructions: 579COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014B7D99 Relevance: 3.1, Strings: 2, Instructions: 579COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE407A Relevance: 1.5, Strings: 1, Instructions: 251COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4088 Relevance: 1.5, Strings: 1, Instructions: 246COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE5B22 Relevance: 1.5, Strings: 1, Instructions: 209COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE5B30 Relevance: 1.5, Strings: 1, Instructions: 208COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E95F00 Relevance: .4, Instructions: 396COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE44B8 Relevance: .2, Instructions: 177COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE44C8 Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE05B0 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE05A0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E93F5E Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014BE800 Relevance: 6.1, APIs: 4, Instructions: 128threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014B5D94 Relevance: 1.6, APIs: 1, Instructions: 98COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014B4524 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEFCE8 Relevance: 1.6, APIs: 1, Instructions: 69threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90A22 Relevance: 1.6, APIs: 1, Instructions: 68COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEFCF0 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90A28 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014BEA48 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90470 Relevance: 1.6, APIs: 1, Instructions: 55memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014BB078 Relevance: 1.6, APIs: 1, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90478 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEFC38 Relevance: 1.6, APIs: 1, Instructions: 52threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEFC40 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 014BC760 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E94F58 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90670 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0145D1FC Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0145D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0146D1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0146D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0146D006 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0145D1F7 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0145D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0146D1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE5362 Relevance: 5.3, Strings: 4, Instructions: 289COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE23B8 Relevance: 5.2, Strings: 4, Instructions: 174COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE2F68 Relevance: 5.2, Strings: 4, Instructions: 162COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE23A8 Relevance: 3.9, Strings: 3, Instructions: 174COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3A81 Relevance: 3.9, Strings: 3, Instructions: 119COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3A90 Relevance: 3.9, Strings: 3, Instructions: 114COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE69B8 Relevance: 2.8, Strings: 2, Instructions: 295COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE69C8 Relevance: 2.8, Strings: 2, Instructions: 295COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4A58 Relevance: 2.7, Strings: 2, Instructions: 168COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4A68 Relevance: 2.7, Strings: 2, Instructions: 165COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE2F59 Relevance: 2.7, Strings: 2, Instructions: 154COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEF418 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE63E0 Relevance: 1.5, Strings: 1, Instructions: 270COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE63D2 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE0011 Relevance: 1.4, Strings: 1, Instructions: 186COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE0040 Relevance: 1.4, Strings: 1, Instructions: 171COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEF40A Relevance: 1.4, Strings: 1, Instructions: 137COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4702 Relevance: 1.4, Strings: 1, Instructions: 112COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4710 Relevance: 1.4, Strings: 1, Instructions: 112COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEDB68 Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AED73A Relevance: .3, Instructions: 316COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AEDFB0 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07E90040 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3808 Relevance: .2, Instructions: 170COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE3818 Relevance: .2, Instructions: 167COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4EA0 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE4EB0 Relevance: .1, Instructions: 135COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE35E8 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE21C2 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07AE35F8 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 14.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 85.7% |
Total number of Nodes: | 7 |
Total number of Limit Nodes: | 1 |
Graph
Function 017D6FC8 Relevance: 6.7, Strings: 5, Instructions: 493COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D9DE0 Relevance: 6.1, Strings: 4, Instructions: 1137COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D69A0 Relevance: 3.0, Strings: 2, Instructions: 515COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D3B85 Relevance: 2.8, Strings: 2, Instructions: 268COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D29EC Relevance: 2.8, Strings: 2, Instructions: 252COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DC146 Relevance: 2.7, Strings: 2, Instructions: 227COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D5362 Relevance: 2.7, Strings: 2, Instructions: 195COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DC468 Relevance: 2.7, Strings: 2, Instructions: 189COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DD278 Relevance: 2.7, Strings: 2, Instructions: 188COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DCA08 Relevance: 2.7, Strings: 2, Instructions: 187COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DCCD8 Relevance: 2.7, Strings: 2, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DCFAA Relevance: 2.7, Strings: 2, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DC738 Relevance: 2.7, Strings: 2, Instructions: 185COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DE97A Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DE988 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D76F1 Relevance: 10.5, Strings: 8, Instructions: 475COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D8490 Relevance: 3.2, Strings: 2, Instructions: 703COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D5F38 Relevance: 2.8, Strings: 2, Instructions: 327COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D6498 Relevance: 2.7, Strings: 2, Instructions: 232COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DAEBA Relevance: 2.6, Strings: 2, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D9D59 Relevance: 2.5, Strings: 2, Instructions: 44COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D0C8F Relevance: 1.8, Strings: 1, Instructions: 546COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D0CA0 Relevance: 1.8, Strings: 1, Instructions: 539COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05A8992C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DE007 Relevance: .7, Instructions: 654COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DE018 Relevance: .6, Instructions: 647COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D80D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DF3F1 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DD548 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D41A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DA303 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D9C30 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D5658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D8370 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D2790 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D8380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DF312 Relevance: .1, Instructions: 82COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D28F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D554 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D6300 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0118D044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D5649 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DAEF0 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D9761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D62F0 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D27F0 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0117D54F Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DF320 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0118D03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D5E98 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DE8E8 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D9C23 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D28A3 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D6739 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D28B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D8EF8 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017DAFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D6748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 017D6920 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.8% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 91 |
Total number of Limit Nodes: | 8 |
Graph
Function 00DBE800 Relevance: 6.1, APIs: 4, Instructions: 128threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DB5D77 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DB5D94 Relevance: 1.6, APIs: 1, Instructions: 100COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DB4524 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02948F88 Relevance: 1.6, APIs: 1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06EEFCE8 Relevance: 1.6, APIs: 1, Instructions: 67threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06EEFCF0 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DBEA48 Relevance: 1.6, APIs: 1, Instructions: 62COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029480F8 Relevance: 1.6, APIs: 1, Instructions: 61windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DBB073 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02948104 Relevance: 1.6, APIs: 1, Instructions: 56windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06EEFC38 Relevance: 1.6, APIs: 1, Instructions: 51threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06EEFC40 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00DBC760 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B6D1FC Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B6D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D006 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B6D1F7 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B6D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 19.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 16 |
Total number of Limit Nodes: | 1 |
Graph
Function 01839DE0 Relevance: 6.1, Strings: 4, Instructions: 1137COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836FC8 Relevance: 5.4, Strings: 4, Instructions: 447COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018369A0 Relevance: 3.0, Strings: 2, Instructions: 515COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183C147 Relevance: 2.7, Strings: 2, Instructions: 231COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01835362 Relevance: 2.7, Strings: 2, Instructions: 195COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183C468 Relevance: 2.7, Strings: 2, Instructions: 192COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183D278 Relevance: 2.7, Strings: 2, Instructions: 188COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183CA08 Relevance: 2.7, Strings: 2, Instructions: 187COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183CCD8 Relevance: 2.7, Strings: 2, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183C738 Relevance: 2.7, Strings: 2, Instructions: 185COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183CFAB Relevance: 2.7, Strings: 2, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183F631 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183E988 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183E97B Relevance: .1, Instructions: 146COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018376F1 Relevance: 10.5, Strings: 8, Instructions: 475COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01835F38 Relevance: 2.8, Strings: 2, Instructions: 266COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836498 Relevance: 2.7, Strings: 2, Instructions: 232COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01833CC0 Relevance: 2.6, Strings: 2, Instructions: 112COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01838EF8 Relevance: 2.6, Strings: 2, Instructions: 108COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01839D59 Relevance: 2.5, Strings: 2, Instructions: 44COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01830C8F Relevance: 1.8, Strings: 1, Instructions: 546COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01830CA0 Relevance: 1.8, Strings: 1, Instructions: 539COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F6992C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183AEF0 Relevance: 1.4, Strings: 1, Instructions: 143COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183E007 Relevance: .7, Instructions: 654COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183E018 Relevance: .6, Instructions: 647COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018380D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183F3F1 Relevance: .2, Instructions: 150COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183D548 Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01834197 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018341A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183A303 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01839C30 Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01835658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01832790 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01838380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018328F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0159D468 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836300 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 015AD044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01835649 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01839761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018362F0 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183F313 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018327F0 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0159D463 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183F320 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 015AD03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01835E98 Relevance: .1, Instructions: 52COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183E8E8 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183ABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01839C23 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018328A3 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836739 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 018328B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0183AFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01832A69 Relevance: 5.1, Strings: 4, Instructions: 96COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01836920 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|