Windows
Analysis Report
product sample requirement.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- product sample requirement.exe (PID: 6576 cmdline:
"C:\Users\ user\Deskt op\product sample re quirement. exe" MD5: 07D5A83558349A82CFA1DC6D68F4D84B) - powershell.exe (PID: 2032 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Add-MpPref erence -Ex clusionPat h "C:\User s\user\Des ktop\produ ct sample requiremen t.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 708 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 1136 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" Add-MpPref erence -Ex clusionPat h "C:\User s\user\App Data\Roami ng\TWmzcmq kuotC.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 5812 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 7368 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - schtasks.exe (PID: 7048 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\TWmz cmqkuotC" /XML "C:\U sers\user\ AppData\Lo cal\Temp\t mpA26.tmp" MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 4280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - product sample requirement.exe (PID: 7236 cmdline:
"C:\Users\ user\Deskt op\product sample re quirement. exe" MD5: 07D5A83558349A82CFA1DC6D68F4D84B)
- TWmzcmqkuotC.exe (PID: 7340 cmdline:
C:\Users\u ser\AppDat a\Roaming\ TWmzcmqkuo tC.exe MD5: 07D5A83558349A82CFA1DC6D68F4D84B) - schtasks.exe (PID: 7540 cmdline:
"C:\Window s\System32 \schtasks. exe" /Crea te /TN "Up dates\TWmz cmqkuotC" /XML "C:\U sers\user\ AppData\Lo cal\Temp\t mp1AB0.tmp " MD5: 48C2FE20575769DE916F48EF0676A965) - conhost.exe (PID: 7548 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - TWmzcmqkuotC.exe (PID: 7592 cmdline:
"C:\Users\ user\AppDa ta\Roaming \TWmzcmqku otC.exe" MD5: 07D5A83558349A82CFA1DC6D68F4D84B)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["teebro1800.dynamic-dns.net"], "Port": 2195, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 6 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
Click to see the 16 entries |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-22T09:18:32.444655+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 50032 | 109.248.151.221 | 2195 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_07154666 | |
Source: | Code function: | 9_2_06DD3936 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | File source: |
Source: | TCP traffic: |
Source: | ASN Name: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_2_0256D57C | |
Source: | Code function: | 0_2_04CC0040 | |
Source: | Code function: | 0_2_04CC003F | |
Source: | Code function: | 0_2_0534E978 | |
Source: | Code function: | 0_2_0534B12C | |
Source: | Code function: | 0_2_0534D868 | |
Source: | Code function: | 0_2_071543E8 | |
Source: | Code function: | 0_2_07156220 | |
Source: | Code function: | 0_2_07151F09 | |
Source: | Code function: | 0_2_071506D8 | |
Source: | Code function: | 0_2_071502A0 | |
Source: | Code function: | 0_2_071A34B8 | |
Source: | Code function: | 0_2_071A2106 | |
Source: | Code function: | 0_2_071A6678 | |
Source: | Code function: | 0_2_071AF678 | |
Source: | Code function: | 0_2_071A6669 | |
Source: | Code function: | 0_2_071AF240 | |
Source: | Code function: | 0_2_071AA2D1 | |
Source: | Code function: | 0_2_071ADE30 | |
Source: | Code function: | 8_2_02F16350 | |
Source: | Code function: | 8_2_02F15678 | |
Source: | Code function: | 8_2_02F184D0 | |
Source: | Code function: | 8_2_02F10BA0 | |
Source: | Code function: | 8_2_02F15330 | |
Source: | Code function: | 9_2_00EBD57C | |
Source: | Code function: | 9_2_06DD36C8 | |
Source: | Code function: | 9_2_06DD54F8 | |
Source: | Code function: | 9_2_06DD06D8 | |
Source: | Code function: | 9_2_06DD02A0 | |
Source: | Code function: | 9_2_06E134B8 | |
Source: | Code function: | 9_2_06E10040 | |
Source: | Code function: | 9_2_06E1F661 | |
Source: | Code function: | 9_2_06E16669 | |
Source: | Code function: | 9_2_06E1F670 | |
Source: | Code function: | 9_2_06E16678 | |
Source: | Code function: | 9_2_06E1A2D1 | |
Source: | Code function: | 9_2_06E1F227 | |
Source: | Code function: | 9_2_06E1F238 | |
Source: | Code function: | 9_2_06E1EE00 | |
Source: | Code function: | 9_2_06E1DCB0 | |
Source: | Code function: | 13_2_02960B92 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: | |||
Source: | Section loaded: |
Source: | Key value queried: | Jump to behavior |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 0_2_0256C3FE | |
Source: | Code function: | 0_2_0256A0E7 | |
Source: | Code function: | 0_2_0256C666 | |
Source: | Code function: | 0_2_0256C4E6 | |
Source: | Code function: | 0_2_025696FE | |
Source: | Code function: | 0_2_0256B80F | |
Source: | Code function: | 0_2_02565F26 | |
Source: | Code function: | 0_2_04CC5849 |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: | |||
Source: | Process information set: |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | |||
Source: | Memory allocated: | |||
Source: | Memory allocated: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | |||
Source: | Queries volume information: |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 11 Windows Management Instrumentation | 1 Scheduled Task/Job | 111 Process Injection | 1 Masquerading | OS Credential Dumping | 221 Security Software Discovery | Remote Services | 11 Archive Collected Data | 1 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 DLL Side-Loading | 1 Scheduled Task/Job | 11 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | Data from Removable Media | 1 Non-Standard Port | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | 1 DLL Side-Loading | 131 Virtualization/Sandbox Evasion | Security Account Manager | 131 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 1 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 111 Process Injection | NTDS | 1 Application Window Discovery | Distributed Component Object Model | Input Capture | 11 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Deobfuscate/Decode Files or Information | LSA Secrets | 1 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 3 Obfuscated Files or Information | Cached Domain Credentials | 13 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 22 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
66% | ReversingLabs | ByteCode-MSIL.Trojan.AgentTesla | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML | |||
66% | ReversingLabs | ByteCode-MSIL.Trojan.AgentTesla |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
teebro1800.dynamic-dns.net | 109.248.151.221 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
109.248.151.221 | teebro1800.dynamic-dns.net | Russian Federation | 52048 | DATACLUBLV | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1560738 |
Start date and time: | 2024-11-22 09:14:44 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 9m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 18 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | product sample requirement.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@19/15@8/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target TWmzcmqkuotC.exe, PID 7592 because it is empty
- Execution Graph export aborted for target product sample requirement.exe, PID 7236 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtCreateKey calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: product sample requirement.exe
Time | Type | Description |
---|---|---|
03:15:37 | API Interceptor | |
03:15:39 | API Interceptor | |
03:15:41 | API Interceptor | |
08:15:41 | Task Scheduler |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
teebro1800.dynamic-dns.net | Get hash | malicious | Remcos | Browse |
| |
Get hash | malicious | Remcos | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
DATACLUBLV | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
| ||
Get hash | malicious | NoCry, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | FormBook, GuLoader | Browse |
|
Process: | C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\product sample requirement.exe.log
Download File
Process: | C:\Users\user\Desktop\product sample requirement.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1216 |
Entropy (8bit): | 5.34331486778365 |
Encrypted: | false |
SSDEEP: | 24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ |
MD5: | 1330C80CAAC9A0FB172F202485E9B1E8 |
SHA1: | 86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492 |
SHA-256: | B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560 |
SHA-512: | 75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2 |
Malicious: | true |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2232 |
Entropy (8bit): | 5.3810236212315665 |
Encrypted: | false |
SSDEEP: | 48:lylWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZeUyus:lGLHxv2IfLZ2KRH6Ougos |
MD5: | 534D6716758747FA57A53A245EB4D6A1 |
SHA1: | 78784FF1B73FBA507598C5D518BE90D9B96EE1B6 |
SHA-256: | 2BC11EC63A7511C3C755BA497E774B153A2C8366E779B00369714A49EE4E492B |
SHA-512: | D957D8DD62F4694C3FF7CE48384356F756370B082B488529AB510C35DB5C06C159EACA9ABEADFC715E13BAB7C5EDF2DD9D7134BDBF6DCF1D2B3F4451E1454475 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1578 |
Entropy (8bit): | 5.116333157337675 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaBIxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT/v |
MD5: | 64F99015749EC0B20ACF03168E78014A |
SHA1: | 774A9C55A40906DA0070A62092842A4AE53A9081 |
SHA-256: | 1D236F557DB2338C7BD73AA87F8D06EE04FC55C3B5E3079E81DA7256A60E0B49 |
SHA-512: | 8E6F5EF54B24F6C57201F5FA2CC0729C265CA87E8DE18EDD03CFCA2E9EB47FA87503056F0E9FF608279744A1E8AFFDAB2D9554D1CEA2F02550DB863F57BC66DF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\product sample requirement.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1578 |
Entropy (8bit): | 5.116333157337675 |
Encrypted: | false |
SSDEEP: | 24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaBIxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT/v |
MD5: | 64F99015749EC0B20ACF03168E78014A |
SHA1: | 774A9C55A40906DA0070A62092842A4AE53A9081 |
SHA-256: | 1D236F557DB2338C7BD73AA87F8D06EE04FC55C3B5E3079E81DA7256A60E0B49 |
SHA-512: | 8E6F5EF54B24F6C57201F5FA2CC0729C265CA87E8DE18EDD03CFCA2E9EB47FA87503056F0E9FF608279744A1E8AFFDAB2D9554D1CEA2F02550DB863F57BC66DF |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\product sample requirement.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 448512 |
Entropy (8bit): | 7.899851657059944 |
Encrypted: | false |
SSDEEP: | 12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr |
MD5: | 07D5A83558349A82CFA1DC6D68F4D84B |
SHA1: | 064AF18045030703BC4C62C99F1ABE5700832E8A |
SHA-256: | 096B33571E80D18C1763A3BD5D019E3177F1547B3CA6E6205A349075CE2FEC18 |
SHA-512: | AA9D794E0FFB14163F3D1C2DF374B99DA287B7CE1DF965E271921A700A9972C6EAD3830F0319EB9EC2D1352E2C0A06BB192045E482B2D54FE091C29DC58946BF |
Malicious: | true |
Antivirus: |
|
Preview: |
Process: | C:\Users\user\Desktop\product sample requirement.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26 |
Entropy (8bit): | 3.95006375643621 |
Encrypted: | false |
SSDEEP: | 3:ggPYV:rPYV |
MD5: | 187F488E27DB4AF347237FE461A079AD |
SHA1: | 6693BA299EC1881249D59262276A0D2CB21F8E64 |
SHA-256: | 255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309 |
SHA-512: | 89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E |
Malicious: | true |
Preview: |
File type: | |
Entropy (8bit): | 7.899851657059944 |
TrID: |
|
File name: | product sample requirement.exe |
File size: | 448'512 bytes |
MD5: | 07d5a83558349a82cfa1dc6d68f4d84b |
SHA1: | 064af18045030703bc4c62c99f1abe5700832e8a |
SHA256: | 096b33571e80d18c1763a3bd5d019e3177f1547b3ca6e6205a349075ce2fec18 |
SHA512: | aa9d794e0ffb14163f3d1c2df374b99da287b7ce1df965e271921a700a9972c6ead3830f0319eb9ec2d1352e2c0a06bb192045e482b2d54fe091c29dc58946bf |
SSDEEP: | 12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr |
TLSH: | AD94018132AD9FABD57A5BF16222645117F5283B6A32F21C1FD240DF2D7AF006761B0B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-<g..............0.............*.... ........@.. .......................@............@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x46eb2a |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x673C2D0F [Tue Nov 19 06:15:43 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6ead6 | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x70000 | 0x64c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x72000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x6c9d8 | 0x54 | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x6cb30 | 0x6cc00 | de7fadb31d125c006b04b7d8ac37576f | False | 0.9335623204022988 | data | 7.914229382691976 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x70000 | 0x64c | 0x800 | ccde5771d2be2cbd7ab9cb27545fa3f8 | False | 0.341796875 | data | 3.514751469590367 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x72000 | 0xc | 0x200 | 6cbf4c2f3aa890a0dbbce9eb4b9fa19a | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x70090 | 0x3bc | data | 0.4131799163179916 | ||
RT_MANIFEST | 0x7045c | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-22T09:17:07.824645+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49835 | 109.248.151.221 | 2195 | TCP |
2024-11-22T09:18:32.444655+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 50032 | 109.248.151.221 | 2195 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 22, 2024 09:15:44.022052050 CET | 49734 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:44.141654968 CET | 2195 | 49734 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:44.141756058 CET | 49734 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:44.761178970 CET | 49734 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:44.880902052 CET | 2195 | 49734 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:45.528965950 CET | 2195 | 49734 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:45.529046059 CET | 49734 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:49.527546883 CET | 49734 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:49.530030966 CET | 49736 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:49.647260904 CET | 2195 | 49734 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:49.649630070 CET | 2195 | 49736 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:49.649843931 CET | 49736 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:49.858047009 CET | 49736 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:49.977694988 CET | 2195 | 49736 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:51.046667099 CET | 2195 | 49736 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:51.049058914 CET | 49736 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:53.464950085 CET | 49736 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:53.466892004 CET | 49738 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:53.584748030 CET | 2195 | 49736 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:53.586877108 CET | 2195 | 49738 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:53.586952925 CET | 49738 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:53.607582092 CET | 49738 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:53.727271080 CET | 2195 | 49738 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:54.934092999 CET | 2195 | 49738 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:54.934185028 CET | 49738 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:57.871717930 CET | 49738 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:57.872847080 CET | 49742 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:57.991333961 CET | 2195 | 49738 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:57.992377996 CET | 2195 | 49742 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:57.992521048 CET | 49742 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:58.038222075 CET | 49742 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:15:58.158031940 CET | 2195 | 49742 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:59.343750000 CET | 2195 | 49742 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:15:59.343822002 CET | 49742 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:02.449476004 CET | 49742 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:02.450926065 CET | 49745 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:02.569233894 CET | 2195 | 49742 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:02.570508957 CET | 2195 | 49745 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:02.570728064 CET | 49745 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:02.589823961 CET | 49745 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:02.709434986 CET | 2195 | 49745 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:03.875591040 CET | 2195 | 49745 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:03.875710964 CET | 49745 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:07.147692919 CET | 49745 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:07.148540974 CET | 49746 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:07.267632008 CET | 2195 | 49745 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:07.268232107 CET | 2195 | 49746 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:07.268423080 CET | 49746 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:07.485743046 CET | 49746 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:07.605431080 CET | 2195 | 49746 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:08.660748959 CET | 2195 | 49746 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:08.660830021 CET | 49746 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:11.293171883 CET | 49746 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:11.294313908 CET | 49747 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:11.412879944 CET | 2195 | 49746 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:11.413945913 CET | 2195 | 49747 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:11.414057016 CET | 49747 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:11.433475971 CET | 49747 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:11.553092003 CET | 2195 | 49747 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:12.763955116 CET | 2195 | 49747 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:12.764040947 CET | 49747 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:15.871279955 CET | 49747 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:15.990838051 CET | 2195 | 49747 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:16.189205885 CET | 49748 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:16.308779955 CET | 2195 | 49748 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:16.308934927 CET | 49748 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:16.329668999 CET | 49748 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:16.451023102 CET | 2195 | 49748 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:17.612530947 CET | 2195 | 49748 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:17.613517046 CET | 49748 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:20.590267897 CET | 49748 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:20.591284990 CET | 49749 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:20.710216999 CET | 2195 | 49748 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:20.710931063 CET | 2195 | 49749 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:20.711157084 CET | 49749 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:20.727669954 CET | 49749 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:20.847393036 CET | 2195 | 49749 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:22.060903072 CET | 2195 | 49749 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:22.061024904 CET | 49749 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:25.730804920 CET | 49749 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:25.733030081 CET | 49750 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:25.850733042 CET | 2195 | 49749 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:25.852746964 CET | 2195 | 49750 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:25.852843046 CET | 49750 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:25.871373892 CET | 49750 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:25.991218090 CET | 2195 | 49750 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:27.202214956 CET | 2195 | 49750 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:27.202306986 CET | 49750 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:29.871376038 CET | 49750 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:29.872512102 CET | 49751 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:29.991084099 CET | 2195 | 49750 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:29.992115974 CET | 2195 | 49751 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:29.992218971 CET | 49751 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:30.010442019 CET | 49751 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:30.130084991 CET | 2195 | 49751 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:31.344849110 CET | 2195 | 49751 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:31.345088005 CET | 49751 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:33.699418068 CET | 49751 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:33.701277018 CET | 49752 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:33.819268942 CET | 2195 | 49751 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:33.821183920 CET | 2195 | 49752 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:33.821288109 CET | 49752 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:33.841543913 CET | 49752 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:33.961118937 CET | 2195 | 49752 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:35.156100988 CET | 2195 | 49752 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:35.157075882 CET | 49752 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:36.933820963 CET | 49752 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:36.934931993 CET | 49755 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:37.061971903 CET | 2195 | 49752 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:37.061986923 CET | 2195 | 49755 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:37.062103033 CET | 49755 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:37.077900887 CET | 49755 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:37.197475910 CET | 2195 | 49755 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:38.841099024 CET | 2195 | 49755 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:38.841577053 CET | 49755 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:38.996411085 CET | 49755 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:38.997776985 CET | 49761 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:39.116080999 CET | 2195 | 49755 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:39.117285013 CET | 2195 | 49761 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:39.117409945 CET | 49761 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:39.146034956 CET | 49761 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:39.265779018 CET | 2195 | 49761 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:40.467009068 CET | 2195 | 49761 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:40.471435070 CET | 49761 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:41.449717999 CET | 49761 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:41.452358007 CET | 49767 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:41.569302082 CET | 2195 | 49761 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:41.571851015 CET | 2195 | 49767 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:41.571963072 CET | 49767 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:41.589179993 CET | 49767 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:41.708695889 CET | 2195 | 49767 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:42.924520969 CET | 2195 | 49767 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:42.927454948 CET | 49767 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:43.684034109 CET | 49767 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:43.685415983 CET | 49773 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:43.803546906 CET | 2195 | 49767 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:43.805008888 CET | 2195 | 49773 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:43.805129051 CET | 49773 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:43.822591066 CET | 49773 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:43.942194939 CET | 2195 | 49773 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:45.202876091 CET | 2195 | 49773 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:45.202971935 CET | 49773 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:45.261915922 CET | 49773 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:45.264307022 CET | 49779 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:45.381469011 CET | 2195 | 49773 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:45.383835077 CET | 2195 | 49779 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:45.383932114 CET | 49779 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:45.405711889 CET | 49779 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:45.525363922 CET | 2195 | 49779 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:46.830090046 CET | 2195 | 49779 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:46.831384897 CET | 49779 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:47.105767012 CET | 49779 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:47.225399017 CET | 2195 | 49779 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:47.424114943 CET | 49785 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:47.543818951 CET | 2195 | 49785 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:47.543932915 CET | 49785 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:47.562681913 CET | 49785 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:47.682248116 CET | 2195 | 49785 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:48.892183065 CET | 2195 | 49785 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:48.896245003 CET | 49785 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:49.293268919 CET | 49785 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:49.295298100 CET | 49791 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:49.412864923 CET | 2195 | 49785 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:49.414874077 CET | 2195 | 49791 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:49.414947987 CET | 49791 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:49.458704948 CET | 49791 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:49.578233957 CET | 2195 | 49791 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:50.718190908 CET | 2195 | 49791 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:50.718305111 CET | 49791 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:51.121918917 CET | 49791 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:51.141486883 CET | 49795 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:51.241497993 CET | 2195 | 49791 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:51.261030912 CET | 2195 | 49795 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:51.261249065 CET | 49795 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:51.279598951 CET | 49795 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:51.399079084 CET | 2195 | 49795 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:52.611619949 CET | 2195 | 49795 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:52.612051010 CET | 49795 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:52.652652025 CET | 49795 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:52.655872107 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:52.772080898 CET | 2195 | 49795 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:52.775517941 CET | 2195 | 49798 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:52.775696993 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:52.793006897 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:52.912575006 CET | 2195 | 49798 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:53.920808077 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.040302038 CET | 2195 | 49798 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:54.080425024 CET | 2195 | 49798 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:54.080604076 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.106349945 CET | 49798 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.107388973 CET | 49804 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.225924015 CET | 2195 | 49798 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:54.226840973 CET | 2195 | 49804 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:54.227046013 CET | 49804 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.409071922 CET | 49804 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:54.528587103 CET | 2195 | 49804 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:55.537517071 CET | 2195 | 49804 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:55.537599087 CET | 49804 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:55.543416023 CET | 49804 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:55.546050072 CET | 49805 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:55.663011074 CET | 2195 | 49804 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:55.665790081 CET | 2195 | 49805 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:55.665868998 CET | 49805 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:55.711365938 CET | 49805 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:16:55.830936909 CET | 2195 | 49805 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:57.016364098 CET | 2195 | 49805 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:16:57.016437054 CET | 49805 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.152672052 CET | 49805 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.156955004 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.272341013 CET | 2195 | 49805 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:01.276680946 CET | 2195 | 49821 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:01.276781082 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.321078062 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.440907001 CET | 2195 | 49821 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:01.440968037 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:01.560574055 CET | 2195 | 49821 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:02.581870079 CET | 2195 | 49821 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:02.581949949 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.543340921 CET | 49821 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.545228958 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.662830114 CET | 2195 | 49821 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:07.664808989 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:07.664879084 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.705071926 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.824592113 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:07.824645042 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:07.944168091 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:07.945422888 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:08.064924002 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:09.111574888 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:09.111649990 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:13.059004068 CET | 49835 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:13.062181950 CET | 49847 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:13.178639889 CET | 2195 | 49835 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:13.181742907 CET | 2195 | 49847 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:13.181822062 CET | 49847 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:13.210834026 CET | 49847 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:13.330384970 CET | 2195 | 49847 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:14.578416109 CET | 2195 | 49847 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:14.578668118 CET | 49847 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:18.373127937 CET | 49847 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:18.493662119 CET | 2195 | 49847 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:18.675962925 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:18.795553923 CET | 2195 | 49859 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:18.795734882 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:18.857994080 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:18.977519035 CET | 2195 | 49859 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:19.043698072 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:19.163161993 CET | 2195 | 49859 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:20.192817926 CET | 2195 | 49859 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:20.192923069 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:24.061059952 CET | 49859 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:24.061290979 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:24.180583954 CET | 2195 | 49859 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:24.180794954 CET | 2195 | 49874 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:24.180927038 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:24.249042034 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:24.368683100 CET | 2195 | 49874 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:25.075208902 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:25.194833040 CET | 2195 | 49874 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:25.531023979 CET | 2195 | 49874 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:25.531100988 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.308948040 CET | 49874 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.310348034 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.428425074 CET | 2195 | 49874 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:29.429868937 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:29.429939032 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.467187881 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.586725950 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:29.586782932 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.706378937 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:29.706465960 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:29.826014996 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:30.074846983 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:30.194346905 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:30.857764959 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:30.860877037 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.090295076 CET | 49886 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.091989994 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.210679054 CET | 2195 | 49886 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:35.212374926 CET | 2195 | 49901 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:35.212479115 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.251195908 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.371129036 CET | 2195 | 49901 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:35.434179068 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:35.553720951 CET | 2195 | 49901 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:36.610152960 CET | 2195 | 49901 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:36.610236883 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:40.449719906 CET | 49901 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:40.453319073 CET | 49913 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:40.570322990 CET | 2195 | 49901 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:40.573648930 CET | 2195 | 49913 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:40.573868990 CET | 49913 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:40.679364920 CET | 49913 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:40.798986912 CET | 2195 | 49913 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:42.040077925 CET | 2195 | 49913 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:42.040231943 CET | 49913 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:46.451353073 CET | 49913 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:46.452172995 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:46.570898056 CET | 2195 | 49913 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:46.571743965 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:46.571939945 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:46.715351105 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:46.834933043 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:47.090765953 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:47.210254908 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:47.968997002 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:47.969118118 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:48.508429050 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:48.508501053 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:52.152774096 CET | 49927 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:52.272329092 CET | 2195 | 49927 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:52.470354080 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:52.590781927 CET | 2195 | 49940 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:52.591088057 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:52.699244976 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:52.819252968 CET | 2195 | 49940 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:53.325701952 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:53.445173979 CET | 2195 | 49940 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:53.898468018 CET | 2195 | 49940 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:53.898545980 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:58.340671062 CET | 49940 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:58.343511105 CET | 49955 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:58.460155964 CET | 2195 | 49940 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:58.462970018 CET | 2195 | 49955 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:58.463148117 CET | 49955 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:58.673439026 CET | 49955 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:17:58.792877913 CET | 2195 | 49955 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:59.813416958 CET | 2195 | 49955 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:17:59.813509941 CET | 49955 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:03.762109995 CET | 49955 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:03.764133930 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:04.039621115 CET | 2195 | 49955 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:04.039663076 CET | 2195 | 49967 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:04.044729948 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:04.217196941 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:04.336832047 CET | 2195 | 49967 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:04.337260962 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:04.456873894 CET | 2195 | 49967 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:05.440903902 CET | 2195 | 49967 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:05.440972090 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:09.294042110 CET | 49967 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:09.297210932 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:09.413470984 CET | 2195 | 49967 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:09.416662931 CET | 2195 | 49978 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:09.417191982 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:09.703227043 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:09.823966980 CET | 2195 | 49978 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:10.074826956 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:10.194314957 CET | 2195 | 49978 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:10.809998035 CET | 2195 | 49978 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:10.810080051 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:15.155011892 CET | 49993 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:15.155014038 CET | 49978 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:15.274580002 CET | 2195 | 49978 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:15.274633884 CET | 2195 | 49993 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:15.275237083 CET | 49993 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:15.334928989 CET | 49993 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:15.454433918 CET | 2195 | 49993 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:16.625097990 CET | 2195 | 49993 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:16.625173092 CET | 49993 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:20.887228966 CET | 49993 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:20.889097929 CET | 50005 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:21.006726027 CET | 2195 | 49993 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:21.008558989 CET | 2195 | 50005 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:21.008635998 CET | 50005 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:21.055896044 CET | 50005 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:21.176043034 CET | 2195 | 50005 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:22.406898022 CET | 2195 | 50005 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:22.406989098 CET | 50005 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:26.419723034 CET | 50005 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:26.539174080 CET | 2195 | 50005 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:26.733974934 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:26.853530884 CET | 2195 | 50021 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:26.853681087 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:26.881724119 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:27.001198053 CET | 2195 | 50021 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:27.001280069 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:27.120812893 CET | 2195 | 50021 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:28.203653097 CET | 2195 | 50021 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:28.203716993 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.044029951 CET | 50021 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.048511028 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.163639069 CET | 2195 | 50021 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:32.167927980 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:32.168018103 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.205600977 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.325073957 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:32.325129032 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.444597960 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:32.444654942 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.564152002 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:32.564203978 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:32.683634043 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:33.554050922 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:33.554192066 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:37.593143940 CET | 50046 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:37.593143940 CET | 50032 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:37.712856054 CET | 2195 | 50032 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:37.712892056 CET | 2195 | 50046 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:37.713078022 CET | 50046 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:37.805833101 CET | 50046 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:37.925368071 CET | 2195 | 50046 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:39.155766010 CET | 2195 | 50046 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:39.158405066 CET | 50046 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:42.981081963 CET | 50046 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:42.983942986 CET | 50048 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:43.101711035 CET | 2195 | 50046 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:43.103727102 CET | 2195 | 50048 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:43.110830069 CET | 50048 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:43.209877968 CET | 50048 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:43.329356909 CET | 2195 | 50048 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:44.520554066 CET | 2195 | 50048 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:44.520641088 CET | 50048 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:48.299293995 CET | 50048 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:48.303780079 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:48.419009924 CET | 2195 | 50048 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:48.423397064 CET | 2195 | 50049 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:48.423482895 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:48.864780903 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:48.984309912 CET | 2195 | 50049 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:48.984369993 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:49.105076075 CET | 2195 | 50049 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:49.821583033 CET | 2195 | 50049 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:49.821672916 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:53.999382019 CET | 50049 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:54.019352913 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:54.118962049 CET | 2195 | 50049 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:54.138919115 CET | 2195 | 50050 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:54.138997078 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:54.332732916 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:54.452950954 CET | 2195 | 50050 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:54.481452942 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:54.600919008 CET | 2195 | 50050 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:55.503173113 CET | 2195 | 50050 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:55.505368948 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:59.591352940 CET | 50050 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:18:59.710803986 CET | 2195 | 50050 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:18:59.903352976 CET | 50051 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:00.024008989 CET | 2195 | 50051 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:00.024251938 CET | 50051 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:00.108057976 CET | 50051 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:00.227464914 CET | 2195 | 50051 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:01.327795029 CET | 2195 | 50051 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:01.328150988 CET | 50051 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:05.137258053 CET | 50051 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:05.138938904 CET | 50052 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:05.256886005 CET | 2195 | 50051 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:05.258414984 CET | 2195 | 50052 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:05.258519888 CET | 50052 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:05.324457884 CET | 50052 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:05.445517063 CET | 2195 | 50052 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:06.608045101 CET | 2195 | 50052 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:06.610094070 CET | 50052 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:10.344913960 CET | 50052 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:10.349524021 CET | 50053 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:10.467278004 CET | 2195 | 50052 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:10.471395969 CET | 2195 | 50053 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:10.471510887 CET | 50053 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:10.498419046 CET | 50053 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:10.617897034 CET | 2195 | 50053 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:11.774960041 CET | 2195 | 50053 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:11.775058985 CET | 50053 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:15.543790102 CET | 50053 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:15.547010899 CET | 50054 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:15.663295984 CET | 2195 | 50053 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:15.666495085 CET | 2195 | 50054 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:15.666660070 CET | 50054 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:15.775243998 CET | 50054 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:15.894781113 CET | 2195 | 50054 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:17.147377014 CET | 2195 | 50054 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:17.147449017 CET | 50054 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.043576002 CET | 50054 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.046864033 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.162997961 CET | 2195 | 50054 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:21.167071104 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:21.167198896 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.394447088 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.514641047 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:21.684566975 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:21.804539919 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:21.996984005 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:22.117243052 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:22.469850063 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:22.469932079 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:27.059252024 CET | 50055 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:27.062689066 CET | 50056 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:27.178706884 CET | 2195 | 50055 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:27.182249069 CET | 2195 | 50056 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:27.188883066 CET | 50056 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:27.365329981 CET | 50056 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:27.486409903 CET | 2195 | 50056 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:28.584558010 CET | 2195 | 50056 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:28.584631920 CET | 50056 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:32.512366056 CET | 50056 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:32.631815910 CET | 2195 | 50056 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:32.832989931 CET | 50057 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:32.952472925 CET | 2195 | 50057 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:32.952569008 CET | 50057 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:32.988400936 CET | 50057 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:33.107973099 CET | 2195 | 50057 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:34.302850008 CET | 2195 | 50057 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:34.302901030 CET | 50057 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.044800043 CET | 50057 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.046646118 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.164489031 CET | 2195 | 50057 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.166166067 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.166281939 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.222270966 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.341814041 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.341878891 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.461364985 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.461412907 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.580791950 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.580878019 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.700433969 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.840866089 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:38.960305929 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:38.960352898 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:39.079804897 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:39.079862118 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Nov 22, 2024 09:19:39.199280024 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:39.475450039 CET | 2195 | 50058 | 109.248.151.221 | 192.168.2.4 |
Nov 22, 2024 09:19:39.483419895 CET | 50058 | 2195 | 192.168.2.4 | 109.248.151.221 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 22, 2024 09:15:43.084871054 CET | 60434 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:15:44.014076948 CET | 53 | 60434 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:16:15.872637033 CET | 57467 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:16:16.187975883 CET | 53 | 57467 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:16:47.107153893 CET | 55302 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:16:47.422873020 CET | 53 | 55302 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:17:18.374810934 CET | 61933 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:17:18.675059080 CET | 53 | 61933 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:17:52.155280113 CET | 60339 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:17:52.469444036 CET | 53 | 60339 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:18:26.423135042 CET | 56478 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:18:26.733156919 CET | 53 | 56478 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:18:59.598335028 CET | 56014 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:18:59.898725033 CET | 53 | 56014 | 1.1.1.1 | 192.168.2.4 |
Nov 22, 2024 09:19:32.515826941 CET | 54627 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 22, 2024 09:19:32.832118988 CET | 53 | 54627 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 22, 2024 09:15:43.084871054 CET | 192.168.2.4 | 1.1.1.1 | 0x834e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:16:15.872637033 CET | 192.168.2.4 | 1.1.1.1 | 0x6152 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:16:47.107153893 CET | 192.168.2.4 | 1.1.1.1 | 0xa8ac | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:17:18.374810934 CET | 192.168.2.4 | 1.1.1.1 | 0x6822 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:17:52.155280113 CET | 192.168.2.4 | 1.1.1.1 | 0xf095 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:18:26.423135042 CET | 192.168.2.4 | 1.1.1.1 | 0x9c96 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:18:59.598335028 CET | 192.168.2.4 | 1.1.1.1 | 0x90a4 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 22, 2024 09:19:32.515826941 CET | 192.168.2.4 | 1.1.1.1 | 0x6a41 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 22, 2024 09:15:44.014076948 CET | 1.1.1.1 | 192.168.2.4 | 0x834e | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:16:16.187975883 CET | 1.1.1.1 | 192.168.2.4 | 0x6152 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:16:47.422873020 CET | 1.1.1.1 | 192.168.2.4 | 0xa8ac | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:17:18.675059080 CET | 1.1.1.1 | 192.168.2.4 | 0x6822 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:17:52.469444036 CET | 1.1.1.1 | 192.168.2.4 | 0xf095 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:18:26.733156919 CET | 1.1.1.1 | 192.168.2.4 | 0x9c96 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:18:59.898725033 CET | 1.1.1.1 | 192.168.2.4 | 0x90a4 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false | ||
Nov 22, 2024 09:19:32.832118988 CET | 1.1.1.1 | 192.168.2.4 | 0x6a41 | No error (0) | 109.248.151.221 | A (IP address) | IN (0x0001) | false |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:15:36 |
Start date: | 22/11/2024 |
Path: | C:\Users\user\Desktop\product sample requirement.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x3b0000 |
File size: | 448'512 bytes |
MD5 hash: | 07D5A83558349A82CFA1DC6D68F4D84B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xfe0000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x150000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 03:15:38 |
Start date: | 22/11/2024 |
Path: | C:\Users\user\Desktop\product sample requirement.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xc40000 |
File size: | 448'512 bytes |
MD5 hash: | 07D5A83558349A82CFA1DC6D68F4D84B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Target ID: | 9 |
Start time: | 03:15:41 |
Start date: | 22/11/2024 |
Path: | C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x620000 |
File size: | 448'512 bytes |
MD5 hash: | 07D5A83558349A82CFA1DC6D68F4D84B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:15:41 |
Start date: | 22/11/2024 |
Path: | C:\Windows\System32\wbem\WmiPrvSE.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff693ab0000 |
File size: | 496'640 bytes |
MD5 hash: | 60FF40CFD7FB8FE41EE4FE9AE5FE1C51 |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 03:15:42 |
Start date: | 22/11/2024 |
Path: | C:\Windows\SysWOW64\schtasks.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x150000 |
File size: | 187'904 bytes |
MD5 hash: | 48C2FE20575769DE916F48EF0676A965 |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 12 |
Start time: | 03:15:42 |
Start date: | 22/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 13 |
Start time: | 03:15:43 |
Start date: | 22/11/2024 |
Path: | C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x710000 |
File size: | 448'512 bytes |
MD5 hash: | 07D5A83558349A82CFA1DC6D68F4D84B |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 9.7% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 2.9% |
Total number of Nodes: | 175 |
Total number of Limit Nodes: | 10 |
Graph
Function 0534E978 Relevance: 7.0, Strings: 5, Instructions: 724COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A34B8 Relevance: 5.6, Strings: 4, Instructions: 562COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A2106 Relevance: 1.8, Strings: 1, Instructions: 562COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07156220 Relevance: .6, Instructions: 588COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071543E8 Relevance: .2, Instructions: 205COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07151F09 Relevance: .1, Instructions: 117COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AA2D1 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07154666 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A2C38 Relevance: 7.9, Strings: 6, Instructions: 442COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0256AD68 Relevance: 1.7, APIs: 1, Instructions: 193COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 025644B4 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04CC4040 Relevance: 1.6, APIs: 1, Instructions: 93COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02565917 Relevance: 1.6, APIs: 1, Instructions: 93COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0534C071 Relevance: 1.6, APIs: 1, Instructions: 72COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0534C078 Relevance: 1.6, APIs: 1, Instructions: 69COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07150FA8 Relevance: 1.6, APIs: 1, Instructions: 67threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0256D23C Relevance: 1.6, APIs: 1, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07151231 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07150FB0 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07151238 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0256D648 Relevance: 1.6, APIs: 1, Instructions: 61COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4FDF Relevance: 1.6, Strings: 1, Instructions: 306COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07151080 Relevance: 1.6, APIs: 1, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07150EF8 Relevance: 1.6, APIs: 1, Instructions: 53threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07151088 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07150F00 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0256AF58 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07155561 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07155568 Relevance: 1.5, APIs: 1, Instructions: 44windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A3D9E Relevance: 1.5, Strings: 1, Instructions: 233COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4894 Relevance: 1.4, Strings: 1, Instructions: 160COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4428 Relevance: 1.4, Strings: 1, Instructions: 107COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4417 Relevance: 1.4, Strings: 1, Instructions: 102COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAD6B Relevance: 1.3, Strings: 1, Instructions: 92COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAD5A Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAED1 Relevance: 1.3, Strings: 1, Instructions: 76COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5608 Relevance: 1.3, Strings: 1, Instructions: 58COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A7EF9 Relevance: 1.3, Strings: 1, Instructions: 51COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A7450 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A3348 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4038 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAF28 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAF26 Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A6D37 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A8560 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A8551 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A2FB0 Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A592C Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4EC9 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5AB0 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024DD01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024DD1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5C94 Relevance: .1, Instructions: 71COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5748 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A6FA0 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024DD005 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ABBC8 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A593C Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 024DD1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D759 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A6C18 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A32C3 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A43B0 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ACA60 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A8430 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A8440 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A83C8 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A7F41 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A3D21 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A7049 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D1D758 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A84F8 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AE5A8 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ACC68 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5FBD Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AFAB0 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AA2A0 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A4E90 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ACC10 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AAD87 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AACB0 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A5FC8 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A55D0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AA56C Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ACD08 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AA2B0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A7029 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04CC0040 Relevance: .3, Instructions: 315COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AF678 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071AF240 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071506D8 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071502A0 Relevance: .3, Instructions: 312COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A6669 Relevance: .3, Instructions: 288COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071A6678 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0256D57C Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04CC003F Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 071ADE30 Relevance: .1, Instructions: 139COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0534B12C Relevance: .1, Instructions: 129COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0534D868 Relevance: .1, Instructions: 127COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02F180E0 Relevance: 1.6, APIs: 1, Instructions: 130COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02F17CD0 Relevance: 1.6, APIs: 1, Instructions: 55COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02F181B0 Relevance: 1.6, APIs: 1, Instructions: 53COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0158D138 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0158D133 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 10.5% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 0% |
Total number of Nodes: | 161 |
Total number of Limit Nodes: | 11 |
Graph
Function 06E10040 Relevance: 15.1, Strings: 10, Instructions: 2603COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E134B8 Relevance: 5.6, Strings: 4, Instructions: 562COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1A2D1 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBAD68 Relevance: 1.7, APIs: 1, Instructions: 197COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB44B4 Relevance: 1.6, APIs: 1, Instructions: 96COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EB5916 Relevance: 1.6, APIs: 1, Instructions: 91COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBD23C Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBD648 Relevance: 1.6, APIs: 1, Instructions: 65COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD0FA8 Relevance: 1.6, APIs: 1, Instructions: 65threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD0FB0 Relevance: 1.6, APIs: 1, Instructions: 63threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD1238 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD1231 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14FDF Relevance: 1.6, Strings: 1, Instructions: 306COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD1080 Relevance: 1.6, APIs: 1, Instructions: 54memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD1088 Relevance: 1.6, APIs: 1, Instructions: 53memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD0EF8 Relevance: 1.6, APIs: 1, Instructions: 50threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD0F00 Relevance: 1.5, APIs: 1, Instructions: 49threadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00EBAF58 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD4831 Relevance: 1.5, APIs: 1, Instructions: 47windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06DD4838 Relevance: 1.5, APIs: 1, Instructions: 44windowCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E13D9E Relevance: 1.5, Strings: 1, Instructions: 233COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14894 Relevance: 1.4, Strings: 1, Instructions: 160COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14428 Relevance: 1.4, Strings: 1, Instructions: 107COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14417 Relevance: 1.4, Strings: 1, Instructions: 100COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AD6B Relevance: 1.3, Strings: 1, Instructions: 92COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AD5A Relevance: 1.3, Strings: 1, Instructions: 84COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AED1 Relevance: 1.3, Strings: 1, Instructions: 76COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15608 Relevance: 1.3, Strings: 1, Instructions: 58COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17450 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E13348 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14038 Relevance: 1.3, Strings: 1, Instructions: 20COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C7AD Relevance: 1.3, Strings: 1, Instructions: 17COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AF28 Relevance: .3, Instructions: 264COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AF23 Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E16D37 Relevance: .2, Instructions: 193COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E18560 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E18551 Relevance: .1, Instructions: 108COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E12FB0 Relevance: .1, Instructions: 106COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E12FC0 Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1592C Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1BD0B Relevance: .1, Instructions: 83COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15AB0 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D4C4 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D3D8 Relevance: .1, Instructions: 75COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C5D0 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14ED8 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C6D1D4 Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C6D01C Relevance: .1, Instructions: 72COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15C94 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15748 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E16FA0 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E9A6 Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1BBB8 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14EC8 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C6D005 Relevance: .1, Instructions: 62COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1FB08 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1CAD2 Relevance: .1, Instructions: 60COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1BBC8 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1593C Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D3D3 Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D4BF Relevance: .1, Instructions: 56COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C692 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C6D1CF Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1CA52 Relevance: .1, Instructions: 51COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17EF9 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C600 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D759 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1CAD8 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1CA60 Relevance: .0, Instructions: 41COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E18440 Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E70A Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1EAAC Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E18430 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E16C28 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E16C18 Relevance: .0, Instructions: 37COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17F41 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E930 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00C5D758 Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E132D0 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E183C8 Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E143B0 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17049 Relevance: .0, Instructions: 34COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E5A0 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E143C0 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17F50 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E753 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E468 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E13D21 Relevance: .0, Instructions: 32COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E183D8 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E13D30 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E478 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1EA82 Relevance: .0, Instructions: 29COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E5F1 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E9BC Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E18508 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1FA99 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E011 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1FAA8 Relevance: .0, Instructions: 23COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E14E90 Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15FBD Relevance: .0, Instructions: 20COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E020 Relevance: .0, Instructions: 18COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1ACB0 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1AD87 Relevance: .0, Instructions: 17COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1A2A0 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E15FC8 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1BCD5 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E155D0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C36C Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1A56C Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E518 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1BD51 Relevance: .0, Instructions: 13COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1EA02 Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1E8FA Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1A2B0 Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E1C19F Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06E17029 Relevance: .0, Instructions: 8COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029608E0 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029608CF Relevance: .1, Instructions: 103COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02960A98 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02961038 Relevance: .1, Instructions: 78COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02960F19 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02960F28 Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 029609CA Relevance: .1, Instructions: 53COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|