Windows
Analysis Report
Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe (PID: 5824 cmdline:
"C:\Users\ user\Deskt op\Scan_Re v 20220731 _PO&OC#88S U778274388 2874_JPEG. exe" MD5: 52F14C343D0B2EC1426E775C6B6569FF) - powershell.exe (PID: 4268 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Add-MpPref erence -Ex clusionPat h "C:\User s\user\App Data\Roami ng\HJnkiZj APsec.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 3340 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 7200 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - schtasks.exe (PID: 4548 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\HJnk iZjAPsec" /XML "C:\U sers\user\ AppData\Lo cal\Temp\t mpB8C6.tmp " MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 6420 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe (PID: 1260 cmdline:
"C:\Users\ user\Deskt op\Scan_Re v 20220731 _PO&OC#88S U778274388 2874_JPEG. exe" MD5: 52F14C343D0B2EC1426E775C6B6569FF)
- HJnkiZjAPsec.exe (PID: 7260 cmdline:
C:\Users\u ser\AppDat a\Roaming\ HJnkiZjAPs ec.exe MD5: 52F14C343D0B2EC1426E775C6B6569FF) - schtasks.exe (PID: 7400 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\HJnk iZjAPsec" /XML "C:\U sers\user\ AppData\Lo cal\Temp\t mpCB45.tmp " MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7408 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - HJnkiZjAPsec.exe (PID: 7448 cmdline:
"C:\Users\ user\AppDa ta\Roaming \HJnkiZjAP sec.exe" MD5: 52F14C343D0B2EC1426E775C6B6569FF)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
404 Keylogger, Snake Keylogger | Snake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram. | No Attribution |
{"Exfil Mode": "SMTP", "Email ID": "skisubi@kafs.co.ug", "Password": "B24AM5D9X9F3ZPN", "Host": "mail.kafs.co.ug", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "skisubi@kafs.co.ug", "Password": "B24AM5D9X9F3ZPN", "Host": "mail.kafs.co.ug", "Port": "587", "Version": "4.4"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_SnakeKeylogger | Yara detected Snake Keylogger | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 26 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
MAL_Envrial_Jan18_1 | Detects Encrial credential stealer malware | Florian Roth |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_VIPKeylogger | Yara detected VIP Keylogger | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Windows_Trojan_SnakeKeylogger_af3faa65 | unknown | unknown |
| |
Click to see the 45 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-25T09:18:06.504984+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:09.405582+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:10.513519+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:10.896570+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49748 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:11.993731+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49751 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:12.481315+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49752 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:16.714838+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49761 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:18.216321+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49767 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:19.178788+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49771 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:21.689635+0200 | 2803305 | 3 | Unknown Traffic | 192.168.2.4 | 49775 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-25T09:18:04.545506+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49735 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:05.889523+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49735 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:07.389273+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49740 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:08.186206+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49742 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:08.779937+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49743 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:09.889320+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49742 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:11.264267+0200 | 2803274 | 2 | Potentially Bad Traffic | 192.168.2.4 | 49749 | 193.122.130.0 | 80 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: | ||
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Location Tracking |
---|
Source: | DNS query: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_0C1CAFFB | |
Source: | Code function: | 6_2_0122F2C0 | |
Source: | Code function: | 6_2_0122F4AC | |
Source: | Code function: | 6_2_0122F961 | |
Source: | Code function: | 6_2_06912DC8 | |
Source: | Code function: | 6_2_06910B30 | |
Source: | Code function: | 6_2_06910B30 | |
Source: | Code function: | 6_2_06912968 | |
Source: | Code function: | 6_2_0691E6B0 | |
Source: | Code function: | 6_2_0691DE00 | |
Source: | Code function: | 6_2_06910673 | |
Source: | Code function: | 6_2_0691EF60 | |
Source: | Code function: | 6_2_0691CCA0 | |
Source: | Code function: | 6_2_06912DC3 | |
Source: | Code function: | 6_2_0691D550 | |
Source: | Code function: | 6_2_0691E258 | |
Source: | Code function: | 6_2_0691F3B8 | |
Source: | Code function: | 6_2_0691EB08 | |
Source: | Code function: | 6_2_0691D0F8 | |
Source: | Code function: | 6_2_0691F810 | |
Source: | Code function: | 6_2_06910853 | |
Source: | Code function: | 6_2_06910040 | |
Source: | Code function: | 6_2_0691D9A8 | |
Source: | Code function: | 6_2_0691310E | |
Source: | Code function: | 11_2_029EF2C0 | |
Source: | Code function: | 11_2_029EF4AC | |
Source: | Code function: | 11_2_029EF961 | |
Source: | Code function: | 11_2_06962DC8 | |
Source: | Code function: | 11_2_06960B30 | |
Source: | Code function: | 11_2_06960B30 | |
Source: | Code function: | 11_2_06962968 | |
Source: | Code function: | 11_2_0696E6B0 | |
Source: | Code function: | 11_2_0696DE00 | |
Source: | Code function: | 11_2_06960673 | |
Source: | Code function: | 11_2_0696EF60 | |
Source: | Code function: | 11_2_0696CCA0 | |
Source: | Code function: | 11_2_06962DC2 | |
Source: | Code function: | 11_2_0696D550 | |
Source: | Code function: | 11_2_0696E258 | |
Source: | Code function: | 11_2_0696F3B8 | |
Source: | Code function: | 11_2_0696EB08 | |
Source: | Code function: | 11_2_0696D0F8 | |
Source: | Code function: | 11_2_0696F810 | |
Source: | Code function: | 11_2_06960853 | |
Source: | Code function: | 11_2_06960040 | |
Source: | Code function: | 11_2_0696D9A8 | |
Source: | Code function: | 11_2_0696310E |
Networking |
---|
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: | ||
Source: | ASN Name: | ||
Source: | ASN Name: |
Source: | JA3 fingerprint: | ||
Source: | JA3 fingerprint: |
Source: | DNS query: | ||
Source: | DNS query: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing |
---|
Source: | .Net Code: |
Source: | .Net Code: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Large array initialization: | ||
Source: | Large array initialization: |
Source: | Process Stats: |
Source: | Code function: | 8_2_085A7244 | |
Source: | Code function: | 8_2_085AB220 |
Source: | Code function: | 0_2_056832E0 | |
Source: | Code function: | 0_2_056832D0 | |
Source: | Code function: | 0_2_05683287 | |
Source: | Code function: | 0_2_056808D4 | |
Source: | Code function: | 0_2_0C1C4410 | |
Source: | Code function: | 0_2_0C1CC128 | |
Source: | Code function: | 0_2_0C1C4C80 | |
Source: | Code function: | 0_2_0C1C6658 | |
Source: | Code function: | 0_2_0C1C4848 | |
Source: | Code function: | 0_2_0C1C68B8 | |
Source: | Code function: | 0_2_0C1C50B8 | |
Source: | Code function: | 0_2_0C1C50A8 | |
Source: | Code function: | 0_2_0C1C68A7 | |
Source: | Code function: | 6_2_01227118 | |
Source: | Code function: | 6_2_0122C146 | |
Source: | Code function: | 6_2_0122A088 | |
Source: | Code function: | 6_2_01225370 | |
Source: | Code function: | 6_2_0122D278 | |
Source: | Code function: | 6_2_0122C468 | |
Source: | Code function: | 6_2_0122C738 | |
Source: | Code function: | 6_2_012269A0 | |
Source: | Code function: | 6_2_0122E988 | |
Source: | Code function: | 6_2_0122CA08 | |
Source: | Code function: | 6_2_0122CCD8 | |
Source: | Code function: | 6_2_0122CFAA | |
Source: | Code function: | 6_2_01223E09 | |
Source: | Code function: | 6_2_0122F961 | |
Source: | Code function: | 6_2_0122E97A | |
Source: | Code function: | 6_2_012239EE | |
Source: | Code function: | 6_2_012229EC | |
Source: | Code function: | 6_2_01223AA1 | |
Source: | Code function: | 6_2_06911E80 | |
Source: | Code function: | 6_2_069117A0 | |
Source: | Code function: | 6_2_06919C18 | |
Source: | Code function: | 6_2_0691FC68 | |
Source: | Code function: | 6_2_06910B30 | |
Source: | Code function: | 6_2_06919328 | |
Source: | Code function: | 6_2_06915028 | |
Source: | Code function: | 6_2_06912968 | |
Source: | Code function: | 6_2_0691E6B0 | |
Source: | Code function: | 6_2_0691E6A0 | |
Source: | Code function: | 6_2_0691DE00 | |
Source: | Code function: | 6_2_06911E70 | |
Source: | Code function: | 6_2_0691178F | |
Source: | Code function: | 6_2_0691EF51 | |
Source: | Code function: | 6_2_0691EF60 | |
Source: | Code function: | 6_2_0691CCA0 | |
Source: | Code function: | 6_2_0691DDFF | |
Source: | Code function: | 6_2_0691D550 | |
Source: | Code function: | 6_2_0691D540 | |
Source: | Code function: | 6_2_06919548 | |
Source: | Code function: | 6_2_0691EAF8 | |
Source: | Code function: | 6_2_0691E258 | |
Source: | Code function: | 6_2_0691E24B | |
Source: | Code function: | 6_2_0691F3B8 | |
Source: | Code function: | 6_2_06918BA0 | |
Source: | Code function: | 6_2_0691EB08 | |
Source: | Code function: | 6_2_06910B20 | |
Source: | Code function: | 6_2_0691D0F8 | |
Source: | Code function: | 6_2_0691D0E9 | |
Source: | Code function: | 6_2_0691F810 | |
Source: | Code function: | 6_2_06915018 | |
Source: | Code function: | 6_2_0691F803 | |
Source: | Code function: | 6_2_06910006 | |
Source: | Code function: | 6_2_06910040 | |
Source: | Code function: | 6_2_0691D999 | |
Source: | Code function: | 6_2_0691D9A8 | |
Source: | Code function: | 8_2_052132E0 | |
Source: | Code function: | 8_2_052132D0 | |
Source: | Code function: | 8_2_052108D4 | |
Source: | Code function: | 8_2_085A18D8 | |
Source: | Code function: | 8_2_085A4900 | |
Source: | Code function: | 8_2_085AB99C | |
Source: | Code function: | 8_2_085A2040 | |
Source: | Code function: | 8_2_085A72E0 | |
Source: | Code function: | 8_2_085A85B1 | |
Source: | Code function: | 8_2_085AD5A0 | |
Source: | Code function: | 8_2_085AD830 | |
Source: | Code function: | 8_2_085AD821 | |
Source: | Code function: | 8_2_085AAAF8 | |
Source: | Code function: | 8_2_085AA1F3 | |
Source: | Code function: | 8_2_085AA200 | |
Source: | Code function: | 8_2_085AB398 | |
Source: | Code function: | 8_2_085AB3A8 | |
Source: | Code function: | 8_2_085AD591 | |
Source: | Code function: | 8_2_085AA638 | |
Source: | Code function: | 11_2_029ED278 | |
Source: | Code function: | 11_2_029E5370 | |
Source: | Code function: | 11_2_029EA088 | |
Source: | Code function: | 11_2_029EC146 | |
Source: | Code function: | 11_2_029EC738 | |
Source: | Code function: | 11_2_029EC468 | |
Source: | Code function: | 11_2_029ECA08 | |
Source: | Code function: | 11_2_029EE988 | |
Source: | Code function: | 11_2_029E69A0 | |
Source: | Code function: | 11_2_029E3E09 | |
Source: | Code function: | 11_2_029ECFAB | |
Source: | Code function: | 11_2_029E6FC8 | |
Source: | Code function: | 11_2_029ECCD8 | |
Source: | Code function: | 11_2_029E29E0 | |
Source: | Code function: | 11_2_029EE97B | |
Source: | Code function: | 11_2_029EF961 | |
Source: | Code function: | 11_2_06961E80 | |
Source: | Code function: | 11_2_069617A0 | |
Source: | Code function: | 11_2_06969C18 | |
Source: | Code function: | 11_2_0696FC68 | |
Source: | Code function: | 11_2_06968BA0 | |
Source: | Code function: | 11_2_06960B30 | |
Source: | Code function: | 11_2_06969328 | |
Source: | Code function: | 11_2_06965028 | |
Source: | Code function: | 11_2_06962968 | |
Source: | Code function: | 11_2_0696E6B0 | |
Source: | Code function: | 11_2_0696E6A0 | |
Source: | Code function: | 11_2_0696DE00 | |
Source: | Code function: | 11_2_06961E70 | |
Source: | Code function: | 11_2_0696178F | |
Source: | Code function: | 11_2_0696EF51 | |
Source: | Code function: | 11_2_0696EF60 | |
Source: | Code function: | 11_2_0696CCA0 | |
Source: | Code function: | 11_2_0696DDFE | |
Source: | Code function: | 11_2_0696D550 | |
Source: | Code function: | 11_2_0696D540 | |
Source: | Code function: | 11_2_06969548 | |
Source: | Code function: | 11_2_0696EAF8 | |
Source: | Code function: | 11_2_0696E258 | |
Source: | Code function: | 11_2_0696E249 | |
Source: | Code function: | 11_2_0696F3B8 | |
Source: | Code function: | 11_2_0696EB08 | |
Source: | Code function: | 11_2_06960B20 | |
Source: | Code function: | 11_2_0696D0F8 | |
Source: | Code function: | 11_2_0696D0E9 | |
Source: | Code function: | 11_2_0696F810 | |
Source: | Code function: | 11_2_06965018 | |
Source: | Code function: | 11_2_06960006 | |
Source: | Code function: | 11_2_0696F801 | |
Source: | Code function: | 11_2_06960040 | |
Source: | Code function: | 11_2_0696D999 | |
Source: | Code function: | 11_2_0696D9A8 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_05689169 | |
Source: | Code function: | 0_2_05689171 | |
Source: | Code function: | 0_2_0573DF7C | |
Source: | Code function: | 0_2_0C1C0527 | |
Source: | Code function: | 0_2_0C1C1639 | |
Source: | Code function: | 6_2_06919244 | |
Source: | Code function: | 8_2_05219169 | |
Source: | Code function: | 8_2_05219171 | |
Source: | Code function: | 8_2_085A3B35 | |
Source: | Code function: | 11_2_06969244 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | |||
Source: | Registry key monitored for changes: | |||
Source: | Registry key monitored for changes: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | |||
Source: | Window / User API: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep count: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: | |||
Source: | Thread sleep time: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: | |||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 6_2_06919328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: | ||
Source: | Reference to suspicious API methods: |
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: | |||
Source: | Queries volume information: |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: | ||
Source: | File opened: |
Source: | File opened: | Jump to behavior | ||
Source: | Key opened: | Jump to behavior | ||
Source: | File opened: | |||
Source: | Key opened: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 11 Disable or Modify Tools | 1 OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 111 Process Injection | 1 Deobfuscate/Decode Files or Information | 1 Input Capture | 13 System Information Discovery | Remote Desktop Protocol | 1 Data from Local System | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 Scheduled Task/Job | 3 Obfuscated Files or Information | Security Account Manager | 1 Query Registry | SMB/Windows Admin Shares | 1 Screen Capture | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Software Packing | NTDS | 11 Security Software Discovery | Distributed Component Object Model | 1 Email Collection | 1 Non-Standard Port | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Process Discovery | SSH | 1 Input Capture | 3 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 31 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | 24 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 31 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 111 Process Injection | Proc Filesystem | 1 System Network Configuration Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
50% | ReversingLabs | Win32.Trojan.CrypterX | ||
100% | Avira | HEUR/AGEN.1304549 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | HEUR/AGEN.1304549 | ||
100% | Joe Sandbox ML | |||
50% | ReversingLabs | Win32.Trojan.CrypterX |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
kafs.co.ug | 104.243.33.38 | true | true | unknown | |
reallyfreegeoip.org | 188.114.97.3 | true | true | unknown | |
api.telegram.org | 149.154.167.220 | true | true | unknown | |
checkip.dyndns.com | 193.122.130.0 | true | false | unknown | |
mail.kafs.co.ug | unknown | unknown | true | unknown | |
checkip.dyndns.org | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false |
| unknown | |
false | unknown | ||
false | unknown | ||
false | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | true | |
188.114.97.3 | reallyfreegeoip.org | European Union | 13335 | CLOUDFLARENETUS | true | |
193.122.130.0 | checkip.dyndns.com | United States | 31898 | ORACLE-BMC-31898US | false | |
104.243.33.38 | kafs.co.ug | United States | 23470 | RELIABLESITEUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1541880 |
Start date and time: | 2024-10-25 09:17:07 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 10m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 16 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@16/11@4/4 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe
Time | Type | Description |
---|---|---|
03:17:59 | API Interceptor | |
03:18:01 | API Interceptor | |
03:18:05 | API Interceptor | |
08:18:03 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.220 | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse | ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | MassLogger RAT | Browse | |||
Get hash | malicious | DCRat | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger | Browse | |||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse | |||
Get hash | malicious | GuLoader, Snake Keylogger | Browse | |||
Get hash | malicious | HTMLPhisher | Browse | |||
188.114.97.3 | Get hash | malicious | HTMLPhisher | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | PureLog Stealer | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
193.122.130.0 | Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Cobalt Strike, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
reallyfreegeoip.org | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
checkip.dyndns.com | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
api.telegram.org | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| |
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | DCRat | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
RELIABLESITEUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Remcos | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | GRQ Scam | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
ORACLE-BMC-31898US | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Mirai, Moobot | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
54328bd36c14bd82ddaa0c04b25ed9ad | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | PureLog Stealer, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| |
Get hash | malicious | DarkCloud | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cobalt Strike | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | DCRat | Browse |
|
Process: | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1415 |
Entropy (8bit): | 5.352427679901606 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRuAE4KzecKIE4oKNzKorE4x84j:MIHK5HKH1qHiYHKh3oPHKMRuAHKzectP |
MD5: | 3978978DE913FD1C068312697D6E5917 |
SHA1: | 1DABBE7FB8F38F6EBF474CE5F0ECAA89F48E2538 |
SHA-256: | 33B7B1668DDD3AB39711F9F93B667F6F2F674348A79228BFA163BA625B37F120 |
SHA-512: | 78694B97F5D03758F503155E5CE5B85AABDF9690F0DFBC51FCE9926BE2D86BCF99E008659420F1E8489A7F6EA125F2776D4C6DC4B151566B529454512352953D |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe.log
Download File
Process: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1415 |
Entropy (8bit): | 5.352427679901606 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRuAE4KzecKIE4oKNzKorE4x84j:MIHK5HKH1qHiYHKh3oPHKMRuAHKzectP |
MD5: | 3978978DE913FD1C068312697D6E5917 |
SHA1: | 1DABBE7FB8F38F6EBF474CE5F0ECAA89F48E2538 |
SHA-256: | 33B7B1668DDD3AB39711F9F93B667F6F2F674348A79228BFA163BA625B37F120 |
SHA-512: | 78694B97F5D03758F503155E5CE5B85AABDF9690F0DFBC51FCE9926BE2D86BCF99E008659420F1E8489A7F6EA125F2776D4C6DC4B151566B529454512352953D |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2232 |
Entropy (8bit): | 5.379677338874509 |
Encrypted: | false |
SSDEEP: | 48:tWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//MPUyus:tLHxvIIwLgZ2KRHWLOugss |
MD5: | EC88D19932BD09E055925B18791E48FB |
SHA1: | AE33B55A24121EF5EAF45CE70F20D046E80D7375 |
SHA-256: | 871612889ACB1697FAD69F6387EE3423C7BD8AAB6776DB9AB765965C48192B80 |
SHA-512: | 1770E81F5D8017B0E17BFA03A567BFA1EEE45B18EB2E448DC2E5FD51EA92B5432B817F78AB66AC0E546663676499AA61797A72EE27204497C62B32FB73BDCAAE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1578 |
Entropy (8bit): | 5.112783275053078 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxVxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTQv |
MD5: | E4BEA43D2518D4DC26A5FDAD6B972E63 |
SHA1: | C5772AE19C34A9967077B63365AD3D63148953F8 |
SHA-256: | A15CACA6172EFA881C0FA87E838F9EC4BB60B57A275762E83FB89FEA7A01C11C |
SHA-512: | 2E74612D1897383EDF743B0B86DACEC6435A35509F777284749C7D8146587560B8454599D0ADFE83F797664B4C4CC3078844AB347633DA8E52826192F2364CFF |
Malicious: | true |
Preview: |
Process: | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1578 |
Entropy (8bit): | 5.112783275053078 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaxVxvn:cge1wYrFdOFzOzN33ODOiDdKrsuTQv |
MD5: | E4BEA43D2518D4DC26A5FDAD6B972E63 |
SHA1: | C5772AE19C34A9967077B63365AD3D63148953F8 |
SHA-256: | A15CACA6172EFA881C0FA87E838F9EC4BB60B57A275762E83FB89FEA7A01C11C |
SHA-512: | 2E74612D1897383EDF743B0B86DACEC6435A35509F777284749C7D8146587560B8454599D0ADFE83F797664B4C4CC3078844AB347633DA8E52826192F2364CFF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 835592 |
Entropy (8bit): | 7.851572121843778 |
Encrypted: | false |
SSDEEP: | 12288:0Ixp/JUVKGUrivb8PLJ4nyF9Vy03dbkX057MIZbSXl8Y4Y+AQ17BNzsD8NE+4kXJ:HfOVKUj8TeQVy03d5QIXXVBNADepJ |
MD5: | 52F14C343D0B2EC1426E775C6B6569FF |
SHA1: | 5C61B57A86C14DE578F2425773F190DA35BE62E2 |
SHA-256: | 5994CF17202884F994B3E294FCA7CD9C2847B6C98A0BDB5E65CF164F830197A9 |
SHA-512: | 544359181255DD25C6A6F3A218C785AD79865C2D41B0F462664EFE4CADFF7DFDA4963811A099A5CBDE78856AF4FCF1189278E026FE77AEA0F840CD880C00A060 |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 7.851572121843778 |
TrID: |
|
File name: | Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
File size: | 835'592 bytes |
MD5: | 52f14c343d0b2ec1426e775c6b6569ff |
SHA1: | 5c61b57a86c14de578f2425773f190da35be62e2 |
SHA256: | 5994cf17202884f994b3e294fca7cd9c2847b6c98a0bdb5e65cf164f830197a9 |
SHA512: | 544359181255dd25c6a6f3a218c785ad79865c2d41b0f462664efe4cadff7dfda4963811a099a5cbde78856af4fcf1189278e026fe77aea0f840cd880c00a060 |
SSDEEP: | 12288:0Ixp/JUVKGUrivb8PLJ4nyF9Vy03dbkX057MIZbSXl8Y4Y+AQ17BNzsD8NE+4kXJ:HfOVKUj8TeQVy03d5QIXXVBNADepJ |
TLSH: | 9B05124C7A65A601C51E6B33CC930648A7B1894BD731F69B51DC9AE70FA9BCDC04FA83 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....x.g.................~..........N.... ........@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4c9c4e |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x671A78C2 [Thu Oct 24 16:41:38 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Signature Valid: | false |
Signature Issuer: | CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | DABD77E44EF6B3BB91740FA46696B779 |
Thumbprint SHA-1: | 5B9E273CF11941FD8C6BE3F038C4797BBE884268 |
Thumbprint SHA-256: | 4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570 |
Serial: | 7C1118CBBADC95DA3752C46E47A27438 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xc9c00 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xca000 | 0x800 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xc8a00 | 0x3608 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xcc000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xc7c54 | 0xc7e00 | 64c2761cc37b2c3c810d1c28909ec490 | False | 0.9194418386491557 | data | 7.8591431826748455 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xca000 | 0x800 | 0x800 | ec5381d10dfe46fcc18db2a8f4ed78e4 | False | 0.33984375 | data | 3.4879933336021693 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xcc000 | 0xc | 0x200 | ddd8fbac1dd381f1bc303af5bfc9bb6a | False | 0.044921875 | data | 0.09800417566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xca090 | 0x3a0 | data | 0.4224137931034483 | ||
RT_MANIFEST | 0xca440 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-25T09:18:04.545506+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49735 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:05.889523+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49735 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:06.504984+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:07.389273+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49740 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:08.186206+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49742 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:08.779937+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49743 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:09.405582+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49745 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:09.889320+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49742 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:10.513519+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:10.896570+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49748 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:11.264267+0200 | 2803274 | ETPRO MALWARE Common Downloader Header Pattern UH | 2 | 192.168.2.4 | 49749 | 193.122.130.0 | 80 | TCP |
2024-10-25T09:18:11.993731+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49751 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:12.481315+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49752 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:16.714838+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49761 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:18.216321+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49767 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:19.178788+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49771 | 188.114.97.3 | 443 | TCP |
2024-10-25T09:18:21.689635+0200 | 2803305 | ETPRO MALWARE Common Downloader Header Pattern H | 3 | 192.168.2.4 | 49775 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 25, 2024 09:18:02.415081978 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:02.420639992 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:02.420799971 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:02.420911074 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:02.426645041 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:03.298923969 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:03.305005074 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:03.310405016 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:04.494503975 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:04.545506001 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:04.640729904 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:04.640775919 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:04.640837908 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:04.669393063 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:04.669447899 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.305022001 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.305116892 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.316490889 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.316543102 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.317656040 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.358016014 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.422760963 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.467341900 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.561542034 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.561815023 CEST | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.561883926 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.569827080 CEST | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.574465036 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:05.579874039 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:05.732852936 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:05.739933968 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.739979029 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.740051985 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.740621090 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:05.740641117 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:05.889523029 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.362864971 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:06.365336895 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:06.365380049 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:06.505076885 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:06.505305052 CEST | 443 | 49738 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:06.505517006 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:06.515547991 CEST | 49738 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:06.522361040 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.522361994 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.528230906 CEST | 80 | 49735 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:06.528578997 CEST | 80 | 49740 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:06.528584957 CEST | 49735 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.528830051 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.529268026 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:06.535057068 CEST | 80 | 49740 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.213610888 CEST | 80 | 49740 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.215579033 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.215614080 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.215687990 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.216144085 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.216156006 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.301635027 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.308387041 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.308502913 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.308840990 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.314671993 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.389272928 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.833147049 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.835344076 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.835426092 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.969799042 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.973526955 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.973839998 CEST | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:07.973923922 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.974271059 CEST | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:07.974605083 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.978060007 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.979105949 CEST | 49743 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.980001926 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.984163046 CEST | 80 | 49740 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.984366894 CEST | 49740 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.984680891 CEST | 80 | 49743 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:07.984755039 CEST | 49743 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.984869957 CEST | 49743 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:07.990391970 CEST | 80 | 49743 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:08.132110119 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:08.179733992 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.179831028 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:08.179939032 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.184767008 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.184806108 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:08.186206102 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:08.649631977 CEST | 80 | 49743 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:08.651253939 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.651310921 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:08.651499987 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.652051926 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:08.652069092 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:08.779937029 CEST | 49743 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:09.034157038 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.034286976 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.158159018 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.158263922 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.159482002 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.266041040 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.268408060 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.268446922 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.278358936 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.405666113 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.405925035 CEST | 443 | 49745 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.405997038 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.406366110 CEST | 49745 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.411640882 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:09.417081118 CEST | 80 | 49746 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:09.417292118 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:09.417397976 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:09.422869921 CEST | 80 | 49746 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:09.438230991 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.479341984 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.577152014 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.577241898 CEST | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.577307940 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.581196070 CEST | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.587796926 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:09.593327045 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:09.761153936 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:09.763168097 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.763221025 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.763433933 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.763817072 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:09.763838053 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:09.889319897 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.125269890 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.125349045 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.125893116 CEST | 80 | 49746 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.127906084 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.127947092 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.128016949 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.128557920 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.128575087 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.186449051 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.371855021 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.374244928 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.374284983 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.513518095 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.513618946 CEST | 443 | 49747 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.513767004 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.514668941 CEST | 49747 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.518594980 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.520155907 CEST | 49749 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.526607990 CEST | 80 | 49742 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.526664972 CEST | 49742 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.527426004 CEST | 80 | 49749 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.527504921 CEST | 49749 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.527626038 CEST | 49749 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.533080101 CEST | 80 | 49749 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.754007101 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.756170034 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.756217957 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.896622896 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.896848917 CEST | 443 | 49748 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:10.897027969 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.897543907 CEST | 49748 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:10.901698112 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.902925968 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.907561064 CEST | 80 | 49746 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.907723904 CEST | 49746 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.908224106 CEST | 80 | 49750 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:10.908317089 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.908457041 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:10.913872004 CEST | 80 | 49750 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:11.211352110 CEST | 80 | 49749 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:11.213052034 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.213129997 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.213210106 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.213512897 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.213531017 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.264266968 CEST | 49749 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:11.696222067 CEST | 80 | 49750 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:11.713490009 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.713540077 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.713635921 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.722547054 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.722563028 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.748816013 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:11.832118988 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.856000900 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.856065035 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.993748903 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.993849039 CEST | 443 | 49751 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:11.994008064 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.994729042 CEST | 49751 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:11.999795914 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.005369902 CEST | 80 | 49753 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:12.005498886 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.005686998 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.011197090 CEST | 80 | 49753 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:12.339420080 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:12.341459036 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:12.341476917 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:12.481333971 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:12.481451035 CEST | 443 | 49752 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:12.481563091 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:12.483849049 CEST | 49752 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:12.504054070 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.505954027 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.509978056 CEST | 80 | 49750 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:12.510054111 CEST | 49750 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.511404991 CEST | 80 | 49754 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:12.511523008 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.511708975 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:12.519828081 CEST | 80 | 49754 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:13.136481047 CEST | 80 | 49753 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:13.138569117 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.138622999 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.138772964 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.139096975 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.139113903 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.186389923 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:13.886181116 CEST | 80 | 49754 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:13.888165951 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.888520002 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.888583899 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.888735056 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.889211893 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.889230013 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.890403986 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:13.890438080 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:13.936168909 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.031276941 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.031368017 CEST | 443 | 49755 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.031424999 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:14.032077074 CEST | 49755 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:14.036794901 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.038033009 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.042469025 CEST | 80 | 49753 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:14.042526007 CEST | 49753 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.043390989 CEST | 80 | 49757 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:14.043488026 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.043553114 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.049160004 CEST | 80 | 49757 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:14.510190964 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.512540102 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:14.512567997 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.655163050 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.655409098 CEST | 443 | 49756 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:14.655483007 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:14.656070948 CEST | 49756 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:14.661170006 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.662547112 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.666908026 CEST | 80 | 49754 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:14.666975021 CEST | 49754 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.668035030 CEST | 80 | 49758 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:14.668122053 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.668287039 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:14.673554897 CEST | 80 | 49758 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:15.272080898 CEST | 80 | 49757 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:15.273675919 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.273715019 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.273796082 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.274236917 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.274254084 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.326807022 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:15.895344973 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.897291899 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.897325993 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.923504114 CEST | 80 | 49758 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:15.925338030 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.925396919 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.925587893 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.925951958 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:15.925971031 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:15.967428923 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.040745020 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.040860891 CEST | 443 | 49759 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.041002035 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.041501999 CEST | 49759 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.045756102 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.046945095 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.051563025 CEST | 80 | 49757 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.051748037 CEST | 49757 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.052294970 CEST | 80 | 49762 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.052366972 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.052448034 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.057847023 CEST | 80 | 49762 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.567929983 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.569463968 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.569509983 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.714617014 CEST | 80 | 49762 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.714864016 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.714994907 CEST | 443 | 49761 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.715132952 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.715744972 CEST | 49761 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.716196060 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.716300011 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.717638016 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.718003988 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:16.718041897 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:16.719335079 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.720510006 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.724881887 CEST | 80 | 49758 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.724960089 CEST | 49758 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.725888968 CEST | 80 | 49765 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.725970030 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.726078033 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:16.731455088 CEST | 80 | 49765 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:16.764295101 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.328624010 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.331309080 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.331365108 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.449722052 CEST | 80 | 49765 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:17.451167107 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.451212883 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.451539040 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.451915979 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.451931953 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.469527960 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.469810009 CEST | 443 | 49764 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:17.469885111 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.470319986 CEST | 49764 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:17.474756002 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.475948095 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.480422020 CEST | 80 | 49762 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:17.480498075 CEST | 49762 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.481295109 CEST | 80 | 49769 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:17.481884003 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.481931925 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:17.487421036 CEST | 80 | 49769 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:17.498675108 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:18.067291975 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.076051950 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.076093912 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.216337919 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.216447115 CEST | 443 | 49767 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.216547012 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.217067957 CEST | 49767 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.293267012 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:18.299062014 CEST | 80 | 49765 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:18.299160004 CEST | 49765 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:18.301734924 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:18.301781893 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:18.301979065 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:18.302445889 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:18.302462101 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:18.420723915 CEST | 80 | 49769 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:18.421885014 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.421942949 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.422019005 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.422271967 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:18.422286034 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:18.467443943 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.028848886 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:19.039529085 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:19.039560080 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:19.155442953 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.155560970 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:19.159368038 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:19.159375906 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.159779072 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.171037912 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:19.178901911 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:19.179131031 CEST | 443 | 49771 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:19.179200888 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:19.179507017 CEST | 49771 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:19.182806969 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.184010029 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.188570976 CEST | 80 | 49769 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:19.188631058 CEST | 49769 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.189356089 CEST | 80 | 49773 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:19.189424992 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.189542055 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:19.194838047 CEST | 80 | 49773 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:19.215329885 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.405200005 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.405289888 CEST | 443 | 49770 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:19.405441046 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:19.434673071 CEST | 49770 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:20.888344049 CEST | 80 | 49773 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:20.915446043 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:20.915487051 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:20.915549994 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:20.916049004 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:20.916064024 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:20.936280012 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.536921024 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:21.549566031 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:21.549607992 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:21.689636946 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:21.689740896 CEST | 443 | 49775 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:21.689857006 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:21.690551043 CEST | 49775 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:21.694411993 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.694940090 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.700973988 CEST | 80 | 49773 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:21.701072931 CEST | 49773 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.701430082 CEST | 80 | 49776 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:21.701530933 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.701718092 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:21.707283974 CEST | 80 | 49776 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:22.365217924 CEST | 80 | 49776 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:22.367127895 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:22.367157936 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:22.367252111 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:22.367595911 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:22.367607117 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:22.420686960 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:22.978107929 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:22.980201006 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:22.980227947 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:23.124188900 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:23.124444008 CEST | 443 | 49777 | 188.114.97.3 | 192.168.2.4 |
Oct 25, 2024 09:18:23.124531031 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:23.125132084 CEST | 49777 | 443 | 192.168.2.4 | 188.114.97.3 |
Oct 25, 2024 09:18:23.137742996 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:23.137789965 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:23.137907028 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:23.138448000 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:23.138514042 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:23.138530970 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:23.144227982 CEST | 80 | 49776 | 193.122.130.0 | 192.168.2.4 |
Oct 25, 2024 09:18:23.144340038 CEST | 49776 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:24.014157057 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.014355898 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:24.016463995 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:24.016474962 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.016901970 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.018351078 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:24.063340902 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.258903980 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.258981943 CEST | 443 | 49778 | 149.154.167.220 | 192.168.2.4 |
Oct 25, 2024 09:18:24.259032965 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:24.261940956 CEST | 49778 | 443 | 192.168.2.4 | 149.154.167.220 |
Oct 25, 2024 09:18:25.608916044 CEST | 49743 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:25.609306097 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:25.614990950 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:25.615115881 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.238082886 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.239008904 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.246808052 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.403197050 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.403522015 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.408977985 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.571563959 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.572483063 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.578128099 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929665089 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929755926 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929792881 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.929795980 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929811001 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929821014 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:26.929850101 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.929862976 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.943955898 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:26.949491978 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.107835054 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.113454103 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:27.118755102 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.277189016 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.278655052 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:27.284167051 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.442811966 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.443223000 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:27.448729992 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.618113041 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.618520975 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:27.624023914 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.806359053 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.806718111 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:27.812200069 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.989905119 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:27.996187925 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:28.001727104 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.159889936 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.160912037 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:28.160912991 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:28.160912991 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:28.160912991 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:28.166570902 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.166582108 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.166835070 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.354264021 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:28.407593012 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:29.754060030 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:29.754539967 CEST | 49749 | 80 | 192.168.2.4 | 193.122.130.0 |
Oct 25, 2024 09:18:29.759841919 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:29.759974957 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.363224030 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.363590956 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.369661093 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.525639057 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.526115894 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.531522989 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.688656092 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.689256907 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.694689989 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.856904030 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.856926918 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.856942892 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.856951952 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:30.857039928 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.857085943 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.859112978 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:30.864454985 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.021244049 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.026710987 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.032098055 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.189497948 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.190547943 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.196064949 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.352897882 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.355957985 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.361422062 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.520215988 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.524898052 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.530472040 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.712662935 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.715848923 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.721471071 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.893815994 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:31.894040108 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:31.899415970 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:32.220639944 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:32.221373081 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:32.221426010 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:32.221445084 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:32.221472979 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:32.229067087 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:32.229078054 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:32.230066061 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:32.230074883 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:33.465142965 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:33.465323925 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:33.465384007 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:33.465496063 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:33.465538979 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:18:33.465732098 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:18:33.465778112 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:20:04.921339035 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:20:04.926753998 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:20:05.085673094 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:20:05.086663008 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:20:09.780473948 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Oct 25, 2024 09:20:09.785945892 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:20:09.942873955 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 |
Oct 25, 2024 09:20:09.943377018 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 25, 2024 09:18:02.402071953 CEST | 61311 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 25, 2024 09:18:02.410170078 CEST | 53 | 61311 | 1.1.1.1 | 192.168.2.4 |
Oct 25, 2024 09:18:04.628822088 CEST | 56335 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 25, 2024 09:18:04.639488935 CEST | 53 | 56335 | 1.1.1.1 | 192.168.2.4 |
Oct 25, 2024 09:18:18.293863058 CEST | 51482 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 25, 2024 09:18:18.301110029 CEST | 53 | 51482 | 1.1.1.1 | 192.168.2.4 |
Oct 25, 2024 09:18:24.901798010 CEST | 50596 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 25, 2024 09:18:25.606920004 CEST | 53 | 50596 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 25, 2024 09:18:02.402071953 CEST | 192.168.2.4 | 1.1.1.1 | 0x7ec0 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 25, 2024 09:18:04.628822088 CEST | 192.168.2.4 | 1.1.1.1 | 0x408f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 25, 2024 09:18:18.293863058 CEST | 192.168.2.4 | 1.1.1.1 | 0x3658 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 25, 2024 09:18:24.901798010 CEST | 192.168.2.4 | 1.1.1.1 | 0xe4ef | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | checkip.dyndns.com | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | 193.122.130.0 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | 132.226.8.169 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | 193.122.6.168 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | 132.226.247.73 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:02.410170078 CEST | 1.1.1.1 | 192.168.2.4 | 0x7ec0 | No error (0) | 158.101.44.242 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:04.639488935 CEST | 1.1.1.1 | 192.168.2.4 | 0x408f | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:04.639488935 CEST | 1.1.1.1 | 192.168.2.4 | 0x408f | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:18.301110029 CEST | 1.1.1.1 | 192.168.2.4 | 0x3658 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:25.606920004 CEST | 1.1.1.1 | 192.168.2.4 | 0xe4ef | No error (0) | kafs.co.ug | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 25, 2024 09:18:25.606920004 CEST | 1.1.1.1 | 192.168.2.4 | 0xe4ef | No error (0) | 104.243.33.38 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49735 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:02.420911074 CEST | 151 | OUT | |
Oct 25, 2024 09:18:03.298923969 CEST | 323 | IN | |
Oct 25, 2024 09:18:03.305005074 CEST | 127 | OUT | |
Oct 25, 2024 09:18:04.494503975 CEST | 323 | IN | |
Oct 25, 2024 09:18:05.574465036 CEST | 127 | OUT | |
Oct 25, 2024 09:18:05.732852936 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49740 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:06.529268026 CEST | 127 | OUT | |
Oct 25, 2024 09:18:07.213610888 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49742 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:07.308840990 CEST | 151 | OUT | |
Oct 25, 2024 09:18:07.969799042 CEST | 323 | IN | |
Oct 25, 2024 09:18:07.974605083 CEST | 127 | OUT | |
Oct 25, 2024 09:18:08.132110119 CEST | 323 | IN | |
Oct 25, 2024 09:18:09.587796926 CEST | 127 | OUT | |
Oct 25, 2024 09:18:09.761153936 CEST | 323 | IN | |
Oct 25, 2024 09:18:10.125269890 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49743 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:07.984869957 CEST | 127 | OUT | |
Oct 25, 2024 09:18:08.649631977 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49746 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:09.417397976 CEST | 151 | OUT | |
Oct 25, 2024 09:18:10.125893116 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49749 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:10.527626038 CEST | 127 | OUT | |
Oct 25, 2024 09:18:11.211352110 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49750 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:10.908457041 CEST | 151 | OUT | |
Oct 25, 2024 09:18:11.696222067 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49753 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:12.005686998 CEST | 151 | OUT | |
Oct 25, 2024 09:18:13.136481047 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49754 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:12.511708975 CEST | 151 | OUT | |
Oct 25, 2024 09:18:13.886181116 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49757 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:14.043553114 CEST | 151 | OUT | |
Oct 25, 2024 09:18:15.272080898 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49758 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:14.668287039 CEST | 151 | OUT | |
Oct 25, 2024 09:18:15.923504114 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.4 | 49762 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:16.052448034 CEST | 151 | OUT | |
Oct 25, 2024 09:18:16.714617014 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.4 | 49765 | 193.122.130.0 | 80 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:16.726078033 CEST | 151 | OUT | |
Oct 25, 2024 09:18:17.449722052 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.4 | 49769 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:17.481931925 CEST | 151 | OUT | |
Oct 25, 2024 09:18:18.420723915 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
14 | 192.168.2.4 | 49773 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:19.189542055 CEST | 151 | OUT | |
Oct 25, 2024 09:18:20.888344049 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
15 | 192.168.2.4 | 49776 | 193.122.130.0 | 80 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Oct 25, 2024 09:18:21.701718092 CEST | 151 | OUT | |
Oct 25, 2024 09:18:22.365217924 CEST | 323 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:05 UTC | 87 | OUT | |
2024-10-25 07:18:05 UTC | 894 | IN | |
2024-10-25 07:18:05 UTC | 366 | IN | |
2024-10-25 07:18:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:06 UTC | 63 | OUT | |
2024-10-25 07:18:06 UTC | 894 | IN | |
2024-10-25 07:18:06 UTC | 366 | IN | |
2024-10-25 07:18:06 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:07 UTC | 87 | OUT | |
2024-10-25 07:18:07 UTC | 894 | IN | |
2024-10-25 07:18:07 UTC | 366 | IN | |
2024-10-25 07:18:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49745 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:09 UTC | 63 | OUT | |
2024-10-25 07:18:09 UTC | 888 | IN | |
2024-10-25 07:18:09 UTC | 366 | IN | |
2024-10-25 07:18:09 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:09 UTC | 87 | OUT | |
2024-10-25 07:18:09 UTC | 896 | IN | |
2024-10-25 07:18:09 UTC | 366 | IN | |
2024-10-25 07:18:09 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49747 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:10 UTC | 63 | OUT | |
2024-10-25 07:18:10 UTC | 890 | IN | |
2024-10-25 07:18:10 UTC | 366 | IN | |
2024-10-25 07:18:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49748 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:10 UTC | 63 | OUT | |
2024-10-25 07:18:10 UTC | 896 | IN | |
2024-10-25 07:18:10 UTC | 366 | IN | |
2024-10-25 07:18:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49751 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:11 UTC | 63 | OUT | |
2024-10-25 07:18:11 UTC | 898 | IN | |
2024-10-25 07:18:11 UTC | 366 | IN | |
2024-10-25 07:18:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49752 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:12 UTC | 63 | OUT | |
2024-10-25 07:18:12 UTC | 901 | IN | |
2024-10-25 07:18:12 UTC | 366 | IN | |
2024-10-25 07:18:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49755 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:13 UTC | 87 | OUT | |
2024-10-25 07:18:14 UTC | 890 | IN | |
2024-10-25 07:18:14 UTC | 366 | IN | |
2024-10-25 07:18:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.4 | 49756 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:14 UTC | 87 | OUT | |
2024-10-25 07:18:14 UTC | 888 | IN | |
2024-10-25 07:18:14 UTC | 366 | IN | |
2024-10-25 07:18:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.4 | 49759 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:15 UTC | 87 | OUT | |
2024-10-25 07:18:16 UTC | 892 | IN | |
2024-10-25 07:18:16 UTC | 366 | IN | |
2024-10-25 07:18:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.4 | 49761 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:16 UTC | 63 | OUT | |
2024-10-25 07:18:16 UTC | 894 | IN | |
2024-10-25 07:18:16 UTC | 366 | IN | |
2024-10-25 07:18:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.4 | 49764 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:17 UTC | 87 | OUT | |
2024-10-25 07:18:17 UTC | 906 | IN | |
2024-10-25 07:18:17 UTC | 366 | IN | |
2024-10-25 07:18:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
14 | 192.168.2.4 | 49767 | 188.114.97.3 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:18 UTC | 63 | OUT | |
2024-10-25 07:18:18 UTC | 894 | IN | |
2024-10-25 07:18:18 UTC | 366 | IN | |
2024-10-25 07:18:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
15 | 192.168.2.4 | 49771 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:19 UTC | 63 | OUT | |
2024-10-25 07:18:19 UTC | 896 | IN | |
2024-10-25 07:18:19 UTC | 366 | IN | |
2024-10-25 07:18:19 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
16 | 192.168.2.4 | 49770 | 149.154.167.220 | 443 | 1260 | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:19 UTC | 345 | OUT | |
2024-10-25 07:18:19 UTC | 344 | IN | |
2024-10-25 07:18:19 UTC | 55 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
17 | 192.168.2.4 | 49775 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:21 UTC | 63 | OUT | |
2024-10-25 07:18:21 UTC | 896 | IN | |
2024-10-25 07:18:21 UTC | 366 | IN | |
2024-10-25 07:18:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
18 | 192.168.2.4 | 49777 | 188.114.97.3 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:22 UTC | 87 | OUT | |
2024-10-25 07:18:23 UTC | 890 | IN | |
2024-10-25 07:18:23 UTC | 366 | IN | |
2024-10-25 07:18:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
19 | 192.168.2.4 | 49778 | 149.154.167.220 | 443 | 7448 | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-25 07:18:24 UTC | 345 | OUT | |
2024-10-25 07:18:24 UTC | 344 | IN | |
2024-10-25 07:18:24 UTC | 55 | IN |
Timestamp | Source Port | Dest Port | Source IP | Dest IP | Commands |
---|---|---|---|---|---|
Oct 25, 2024 09:18:26.238082886 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 | 220-gracious.crystalwebhosting.com ESMTP Exim 4.98 #2 Fri, 25 Oct 2024 03:18:26 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Oct 25, 2024 09:18:26.239008904 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 | EHLO 927537 |
Oct 25, 2024 09:18:26.403197050 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 | 250-gracious.crystalwebhosting.com Hello 927537 [173.254.250.81] 250-SIZE 52428800 250-LIMITS MAILMAX=1000 RCPTMAX=50000 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Oct 25, 2024 09:18:26.403522015 CEST | 49779 | 587 | 192.168.2.4 | 104.243.33.38 | STARTTLS |
Oct 25, 2024 09:18:26.571563959 CEST | 587 | 49779 | 104.243.33.38 | 192.168.2.4 | 220 TLS go ahead |
Oct 25, 2024 09:18:30.363224030 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 | 220-gracious.crystalwebhosting.com ESMTP Exim 4.98 #2 Fri, 25 Oct 2024 03:18:30 -0400 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail. |
Oct 25, 2024 09:18:30.363590956 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 | EHLO 927537 |
Oct 25, 2024 09:18:30.525639057 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 | 250-gracious.crystalwebhosting.com Hello 927537 [173.254.250.81] 250-SIZE 52428800 250-LIMITS MAILMAX=1000 RCPTMAX=50000 250-8BITMIME 250-PIPELINING 250-PIPECONNECT 250-STARTTLS 250 HELP |
Oct 25, 2024 09:18:30.526115894 CEST | 49780 | 587 | 192.168.2.4 | 104.243.33.38 | STARTTLS |
Oct 25, 2024 09:18:30.688656092 CEST | 587 | 49780 | 104.243.33.38 | 192.168.2.4 | 220 TLS go ahead |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:17:58 |
Start date: | 25/10/2024 |
Path: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd30000 |
File size: | 835'592 bytes |
MD5 hash: | 52F14C343D0B2EC1426E775C6B6569FF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:18:01 |
Start date: | 25/10/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf00000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:18:01 |
Start date: | 25/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:18:01 |
Start date: | 25/10/2024 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:18:01 |
Start date: | 25/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:18:01 |
Start date: | 25/10/2024 |
Path: | C:\Users\user\Desktop\Scan_Rev 20220731_PO&OC#88SU7782743882874_JPEG.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8b0000 |
File size: | 835'592 bytes |
MD5 hash: | 52F14C343D0B2EC1426E775C6B6569FF |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 7 |
Start time: | 03:18:02 |
Start date: | 25/10/2024 |
Path: | C:\Windows\System32\wbem\WmiPrvSE.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff693ab0000 |
File size: | 496'640 bytes |
MD5 hash: | 60FF40CFD7FB8FE41EE4FE9AE5FE1C51 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 03:18:03 |
Start date: | 25/10/2024 |
Path: | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x890000 |
File size: | 835'592 bytes |
MD5 hash: | 52F14C343D0B2EC1426E775C6B6569FF |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Has exited: | true |
Target ID: | 9 |
Start time: | 03:18:05 |
Start date: | 25/10/2024 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb50000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:18:06 |
Start date: | 25/10/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 11 |
Start time: | 03:18:06 |
Start date: | 25/10/2024 |
Path: | C:\Users\user\AppData\Roaming\HJnkiZjAPsec.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x7a0000 |
File size: | 835'592 bytes |
MD5 hash: | 52F14C343D0B2EC1426E775C6B6569FF |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Has exited: | false |
Execution Graph
Execution Coverage: | 9.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 230 |
Total number of Limit Nodes: | 9 |
Graph
Function 0C1C4410 Relevance: 1.6, Strings: 1, Instructions: 312COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1CC128 Relevance: .4, Instructions: 437COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1CAFFB Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05684B84 Relevance: 1.6, APIs: 1, Instructions: 117COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05684B90 Relevance: 1.6, APIs: 1, Instructions: 113COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 056827FC Relevance: 1.6, APIs: 1, Instructions: 97COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01416914 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C7460 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C71D9 Relevance: 1.6, APIs: 1, Instructions: 65threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C7468 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C71E0 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C72B1 Relevance: 1.6, APIs: 1, Instructions: 57memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C7129 Relevance: 1.6, APIs: 1, Instructions: 53threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C72B8 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C7130 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C5E18 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0141E218 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1CB7A9 Relevance: 1.5, APIs: 1, Instructions: 45windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05738CAC Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573F650 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573F640 Relevance: 1.4, Strings: 1, Instructions: 200COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05738C74 Relevance: 1.4, Strings: 1, Instructions: 128COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573C9A8 Relevance: .6, Instructions: 551COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573C998 Relevance: .3, Instructions: 344COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573F371 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E707 Relevance: .2, Instructions: 174COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E518 Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05732DF4 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573D632 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E508 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573B2B8 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573D538 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573B2C8 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573AB7C Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013CD034 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013BD3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013CD055 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013CD0DC Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013CD294 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573C401 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573ADD0 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013BD3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573A96C Relevance: .1, Instructions: 55COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013CD28F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573BEB9 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573C8A7 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E498 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573DC20 Relevance: .0, Instructions: 46COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E03F Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573D878 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573BE48 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573D868 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573AB5C Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573DCBA Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573BEE0 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573DC48 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573B218 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573BE58 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573DCC8 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573B228 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573AD69 Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573AE99 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573E4C0 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05738CEC Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05732FE4 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573BE10 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573DD20 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573EF10 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0573EF20 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C6658 Relevance: .5, Instructions: 489COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 056832E0 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C4C80 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C4848 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C50B8 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 056808D4 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05683287 Relevance: .2, Instructions: 232COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 056832D0 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C68A7 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C50A8 Relevance: .1, Instructions: 132COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0C1C68B8 Relevance: .1, Instructions: 127COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05734748 Relevance: 41.7, Strings: 33, Instructions: 438COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05734758 Relevance: 41.7, Strings: 33, Instructions: 434COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 17.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 14.9% |
Total number of Nodes: | 47 |
Total number of Limit Nodes: | 13 |
Graph
Function 01227118 Relevance: 6.7, Strings: 5, Instructions: 414COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122C146 Relevance: 6.5, Strings: 5, Instructions: 225COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122D278 Relevance: 6.4, Strings: 5, Instructions: 190COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122CCD8 Relevance: 6.4, Strings: 5, Instructions: 186COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01225370 Relevance: 6.4, Strings: 5, Instructions: 185COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122C468 Relevance: 6.4, Strings: 5, Instructions: 185COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122CA08 Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122C738 Relevance: 6.4, Strings: 5, Instructions: 182COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122CFAA Relevance: 6.4, Strings: 5, Instructions: 182COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012229EC Relevance: 5.5, Strings: 4, Instructions: 490COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122A088 Relevance: 3.4, Strings: 2, Instructions: 892COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012269A0 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01223E09 Relevance: 2.8, Strings: 2, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06919548 Relevance: 1.6, APIs: 1, Instructions: 88libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122E97A Relevance: .1, Instructions: 148COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122E988 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012276F1 Relevance: 10.5, Strings: 8, Instructions: 471COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01228490 Relevance: 3.2, Strings: 2, Instructions: 701COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01225F38 Relevance: 2.8, Strings: 2, Instructions: 268COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226498 Relevance: 2.7, Strings: 2, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01229C30 Relevance: 2.6, Strings: 2, Instructions: 148COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01223CC0 Relevance: 2.6, Strings: 2, Instructions: 112COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01220C8F Relevance: 1.8, Strings: 1, Instructions: 546COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01220CA0 Relevance: 1.8, Strings: 1, Instructions: 539COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0691992C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122AEF0 Relevance: 1.4, Strings: 1, Instructions: 145COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122E007 Relevance: .7, Instructions: 652COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122E018 Relevance: .6, Instructions: 647COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01229A10 Relevance: .2, Instructions: 228COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012280D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122F71F Relevance: .2, Instructions: 153COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122D548 Relevance: .1, Instructions: 137COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012241A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122A303 Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226FC8 Relevance: .1, Instructions: 112COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01225658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01228370 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01228380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01222790 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012262F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012228F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0111D044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01224285 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01225649 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01229761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122F640 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226300 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012227F0 Relevance: .1, Instructions: 57COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122F650 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0111D03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01225E98 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122ABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122E8E8 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012228AA Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 012228B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01228EF8 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226739 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122D6D4 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0122AFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01226920 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 1.5% |
Total number of Nodes: | 195 |
Total number of Limit Nodes: | 7 |
Graph
Function 085AB220 Relevance: 1.6, APIs: 1, Instructions: 59nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085A7244 Relevance: 1.6, APIs: 1, Instructions: 58nativeCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 052126A8 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05214B84 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 052127FC Relevance: 1.6, APIs: 1, Instructions: 97COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 01296914 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085AB8E4 Relevance: 1.6, APIs: 1, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05210594 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05210A09 Relevance: 1.6, APIs: 1, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085AB914 Relevance: 1.6, APIs: 1, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085AC631 Relevance: 1.6, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0129E218 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05228CAC Relevance: 1.5, Strings: 1, Instructions: 292COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522F650 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522F640 Relevance: 1.4, Strings: 1, Instructions: 200COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05228C74 Relevance: 1.4, Strings: 1, Instructions: 128COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085AC6E0 Relevance: 1.3, APIs: 1, Instructions: 52COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 085AB920 Relevance: 1.3, APIs: 1, Instructions: 50COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522AD30 Relevance: 1.3, Strings: 1, Instructions: 43COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522C9A8 Relevance: .6, Instructions: 551COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522C998 Relevance: .3, Instructions: 344COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522F380 Relevance: .2, Instructions: 197COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E708 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E518 Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E706 Relevance: .2, Instructions: 165COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522F371 Relevance: .1, Instructions: 145COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05222DF4 Relevance: .1, Instructions: 105COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522D632 Relevance: .1, Instructions: 102COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E508 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B2B8 Relevance: .1, Instructions: 94COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522D538 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B2C8 Relevance: .1, Instructions: 92COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522AB7C Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0124D034 Relevance: .1, Instructions: 88COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522C3D8 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0124D055 Relevance: .1, Instructions: 73COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0124D294 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0124D0DC Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522ACF0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0124D28F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522C8A7 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522BEB9 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522DC20 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522A950 Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522D878 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522BE48 Relevance: .0, Instructions: 42COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522AB5C Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522D868 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522DCBA Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E498 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E03F Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E050 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522AE80 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522DC48 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522BEE0 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522BE58 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B218 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522DCC8 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B228 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522E4C0 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522A338 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05228CEC Relevance: .0, Instructions: 24COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05222FE4 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522AE31 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522BE10 Relevance: .0, Instructions: 22COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522DD20 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B641 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522EF20 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522EF10 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0522B650 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05224748 Relevance: 41.7, Strings: 33, Instructions: 438COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05224758 Relevance: 41.7, Strings: 33, Instructions: 434COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 19.3% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 47 |
Total number of Limit Nodes: | 12 |
Graph
Function 029EC468 Relevance: 9.0, Strings: 7, Instructions: 229COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6FC8 Relevance: 6.7, Strings: 5, Instructions: 462COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EC146 Relevance: 6.5, Strings: 5, Instructions: 254COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ED278 Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ECA08 Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ECCD8 Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E5370 Relevance: 6.4, Strings: 5, Instructions: 183COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EC738 Relevance: 6.4, Strings: 5, Instructions: 182COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ECFAB Relevance: 6.4, Strings: 5, Instructions: 182COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EA088 Relevance: 3.4, Strings: 2, Instructions: 893COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E69A0 Relevance: 3.0, Strings: 2, Instructions: 510COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E3E09 Relevance: 2.9, Strings: 2, Instructions: 429COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06969548 Relevance: 1.6, APIs: 1, Instructions: 88libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EE988 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EE97B Relevance: .1, Instructions: 144COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E76F1 Relevance: 10.5, Strings: 8, Instructions: 471COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E8490 Relevance: 3.2, Strings: 2, Instructions: 701COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E5F38 Relevance: 2.8, Strings: 2, Instructions: 325COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6498 Relevance: 2.7, Strings: 2, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E9C30 Relevance: 2.6, Strings: 2, Instructions: 148COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E3CB1 Relevance: 2.6, Strings: 2, Instructions: 115COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E0C8F Relevance: 1.8, Strings: 1, Instructions: 541COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E0CA0 Relevance: 1.8, Strings: 1, Instructions: 539COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0696992C Relevance: 1.6, APIs: 1, Instructions: 62libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EAEF0 Relevance: 1.4, Strings: 1, Instructions: 141COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EE007 Relevance: .7, Instructions: 652COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EE018 Relevance: .6, Instructions: 647COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E9A10 Relevance: .2, Instructions: 230COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E80D8 Relevance: .2, Instructions: 201COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EF71F Relevance: .2, Instructions: 152COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ED548 Relevance: .1, Instructions: 136COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E41A0 Relevance: .1, Instructions: 134COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EA303 Relevance: .1, Instructions: 123COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E5658 Relevance: .1, Instructions: 101COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E8380 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E8370 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E62F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E28F0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0115D044 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E5649 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E9761 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6300 Relevance: .1, Instructions: 59COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EF640 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EF650 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E27F0 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0115D03F Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E5E98 Relevance: .0, Instructions: 50COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EABE0 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EE8E8 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E28A2 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E28B0 Relevance: .0, Instructions: 19COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E8EF8 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6739 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029ED6D4 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029EAFAD Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6748 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E2A69 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029E6920 Relevance: 5.0, Strings: 4, Instructions: 49COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|