Windows
Analysis Report
WV7Gj9lJ7W.exe
Overview
General Information
Sample name: | WV7Gj9lJ7W.exerenamed because original name is a hash value |
Original sample name: | 45b4e53e206933804c6febfcd5bddc27599c63aaaa2921afacc4d7f52a853f3a.exe |
Analysis ID: | 1561588 |
MD5: | f5869349b4c3c5902601673ccb454f8c |
SHA1: | 0b164e7101927fe06ddbb98b0a85bdd7757f1734 |
SHA256: | 45b4e53e206933804c6febfcd5bddc27599c63aaaa2921afacc4d7f52a853f3a |
Tags: | exeuser-Chainskilabs |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- WV7Gj9lJ7W.exe (PID: 6880 cmdline:
"C:\Users\ user\Deskt op\WV7Gj9l J7W.exe" MD5: F5869349B4C3C5902601673CCB454F8C) - schtasks.exe (PID: 6208 cmdline:
"C:\Window s\System32 \schtasks. exe" /crea te /f /RL HIGHEST /s c minute / mo 1 /tn " svchost" / tr "C:\Use rs\user\Ap pData\Loca l\Temp\svc host.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2) - conhost.exe (PID: 6252 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 1720 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\svchost .exe MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 7164 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\svchos t.exe" MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 5216 cmdline:
"C:\Users\ user\AppDa ta\Local\T emp\svchos t.exe" MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 2448 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\svchost .exe MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 3868 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\svchost .exe MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 984 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\svchost .exe MD5: F5869349B4C3C5902601673CCB454F8C)
- svchost.exe (PID: 6044 cmdline:
C:\Users\u ser\AppDat a\Local\Te mp\svchost .exe MD5: F5869349B4C3C5902601673CCB454F8C)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
XWorm | Malware with wide range of capabilities ranging from RAT to ransomware. | No Attribution |
{"C2 url": ["127.0.0.1", "104.198.168.179"], "Port": 1337, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm_1 | Yara detected XWorm | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_TelegramRecon | Yara detected Telegram Recon | Joe Security | ||
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
| |
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
Click to see the 5 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_XWorm | Yara detected XWorm | Joe Security | ||
JoeSecurity_GenericDownloader_1 | Yara detected Generic Downloader | Joe Security | ||
JoeSecurity_TelegramRAT | Yara detected Telegram RAT | Joe Security | ||
MALWARE_Win_AsyncRAT | Detects AsyncRAT | ditekSHen |
|
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: |
Source: | Author: David Burkett, @signalblur: |
Source: | Author: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: vburov: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:05:09.461983+0100 | 2853685 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 149.154.167.220 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:05:22.397821+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:35.078050+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:35.451440+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:46.991636+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:59.267623+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:05.101176+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:11.549167+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:13.131562+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:14.643237+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:14.853519+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:20.167925+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.137384+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.347308+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.513261+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:30.676427+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:31.032166+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:35.112652+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.039461+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.453248+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.577525+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:51.654773+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:51.865118+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:52.611373+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:04.881338+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:05.114900+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:06.522645+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:08.971165+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:21.272547+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:26.353000+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:28.957630+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:30.374088+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.152096+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.583856+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:44.662640+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:47.910781+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:48.808516+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:55.471231+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:55.962843+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:04.155869+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:05.095467+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:06.675480+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:17.083526+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:27.724238+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:27.973037+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:28.743924+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:35.150293+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:37.728440+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:42.957033+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:48.144468+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:53.227048+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:57.895371+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:58.227147+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:04.665319+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:05.094644+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:06.781238+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:19.091410+0100 | 2852870 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:05:22.465831+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:35.453664+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:46.994001+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:59.277702+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:11.559813+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:13.137609+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:14.645165+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:14.855413+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:20.174352+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.181200+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.360656+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.519507+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:30.678923+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:30.925272+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:31.034909+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:31.054378+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:41.533917+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:41.697319+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:51.658601+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:51.868469+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:52.613190+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:04.886631+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:06.524879+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:08.973095+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:21.275253+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:26.355168+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:28.959846+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:30.376164+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:35.592877+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:44.665162+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:47.913494+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:48.810715+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:55.473795+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:55.964678+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:04.165772+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:06.729947+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:06.899211+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:07.064909+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:17.086072+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:27.730954+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:27.975903+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:28.746440+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:37.730791+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:42.958984+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:43.203569+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:43.325613+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:48.149101+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:53.229056+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:57.984436+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:58.231872+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:04.667440+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:06.782274+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:19.092806+0100 | 2852923 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:05:35.078050+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:05.101176+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:35.112652+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:05.114900+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.152096+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:05.095467+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:35.150293+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:05.094644+0100 | 2852874 | 1 | Malware Command and Control Activity Detected | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:08:03.766636+0100 | 2853193 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: |
Source: | DNS query: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | DNS query: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Window created: | Jump to behavior |
Operating System Destruction |
---|
Source: | Process information set: | Jump to behavior |
System Summary |
---|
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Code function: | 0_2_00007FFD9B8B1779 | |
Source: | Code function: | 0_2_00007FFD9B8B6FD2 | |
Source: | Code function: | 0_2_00007FFD9B8B6226 | |
Source: | Code function: | 0_2_00007FFD9B8B24F1 | |
Source: | Code function: | 0_2_00007FFD9B8BFD04 | |
Source: | Code function: | 0_2_00007FFD9B8B2259 | |
Source: | Code function: | 3_2_00007FFD9B881779 | |
Source: | Code function: | 3_2_00007FFD9B8810FA | |
Source: | Code function: | 3_2_00007FFD9B882259 | |
Source: | Code function: | 5_2_00007FFD9B8A1779 | |
Source: | Code function: | 5_2_00007FFD9B8A10FA | |
Source: | Code function: | 5_2_00007FFD9B8A2259 | |
Source: | Code function: | 8_2_00007FFD9B8B1779 | |
Source: | Code function: | 8_2_00007FFD9B8B10FA | |
Source: | Code function: | 8_2_00007FFD9B8B2259 | |
Source: | Code function: | 9_2_00007FFD9B8A1779 | |
Source: | Code function: | 9_2_00007FFD9B8A10FA | |
Source: | Code function: | 9_2_00007FFD9B8A2259 | |
Source: | Code function: | 11_2_00007FFD9B891779 | |
Source: | Code function: | 11_2_00007FFD9B8910FA | |
Source: | Code function: | 11_2_00007FFD9B892259 | |
Source: | Code function: | 13_2_00007FFD9B8B1779 | |
Source: | Code function: | 13_2_00007FFD9B8B10FA | |
Source: | Code function: | 13_2_00007FFD9B8B2259 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: | ||
Source: | Matched rule: |
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: | ||
Source: | Cryptographic APIs: |
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: | ||
Source: | Security API names: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | LNK file: |
Source: | Static PE information: |
Source: | Static PE information: |
Data Obfuscation |
---|
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: | ||
Source: | .Net Code: |
Source: | Code function: | 5_2_00007FFD9B8A00C1 | |
Source: | Code function: | 9_2_00007FFD9B8A00C1 | |
Source: | Code function: | 11_2_00007FFD9B8900C1 | |
Source: | Code function: | 12_2_00007FFD9B8A00C1 |
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: | ||
Source: | High entropy of concatenated method names: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Boot Survival |
---|
Source: | Process created: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Registry value created or modified: | Jump to behavior | ||
Source: | Registry value created or modified: | Jump to behavior |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | HTTP traffic detected: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior | ||
Source: | File Volume queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior | ||
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Code function: | 0_2_00007FFD9B8B7BE1 |
Source: | Process queried: | Jump to behavior |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Language, Device and Operating System Detection |
---|
Source: | File source: | ||
Source: | File source: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | OS Credential Dumping | 1 File and Directory Discovery | Remote Services | 11 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Scheduled Task/Job | 1 Scheduled Task/Job | 11 Process Injection | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 23 System Information Discovery | Remote Desktop Protocol | 1 Clipboard Data | 3 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | 21 Registry Run Keys / Startup Folder | 1 Scheduled Task/Job | 1 Obfuscated Files or Information | Security Account Manager | 1 Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | 21 Registry Run Keys / Startup Folder | 2 Software Packing | NTDS | 541 Security Software Discovery | Distributed Component Object Model | Input Capture | 1 Non-Standard Port | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 1 Process Discovery | SSH | Keylogging | 3 Non-Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 11 Masquerading | Cached Domain Credentials | 151 Virtualization/Sandbox Evasion | VNC | GUI Input Capture | 14 Application Layer Protocol | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 151 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 11 Process Injection | Proc Filesystem | 1 System Network Configuration Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
76% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT | ||
100% | Avira | TR/Spy.Gen | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira | TR/Spy.Gen | ||
100% | Joe Sandbox ML | |||
76% | ReversingLabs | ByteCode-MSIL.Spyware.AsyncRAT |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
ip-api.com | 208.95.112.1 | true | false | high | |
api.telegram.org | 149.154.167.220 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
208.95.112.1 | ip-api.com | United States | 53334 | TUT-ASUS | false | |
149.154.167.220 | api.telegram.org | United Kingdom | 62041 | TELEGRAMRU | false | |
104.198.168.179 | unknown | United States | 15169 | GOOGLEUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1561588 |
Start date and time: | 2024-11-23 21:04:06 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 37s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 14 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | WV7Gj9lJ7W.exerenamed because original name is a hash value |
Original Sample Name: | 45b4e53e206933804c6febfcd5bddc27599c63aaaa2921afacc4d7f52a853f3a.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@11/4@2/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target svchost.exe, PID 1720 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 2448 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 3868 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 5216 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 6044 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 7164 because it is empty
- Execution Graph export aborted for target svchost.exe, PID 984 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtReadVirtualMemory calls found.
- VT rate limit hit for: WV7Gj9lJ7W.exe
Time | Type | Description |
---|---|---|
15:05:06 | API Interceptor | |
20:05:06 | Task Scheduler | |
20:05:09 | Autostart | |
20:05:18 | Autostart | |
20:05:26 | Autostart |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
208.95.112.1 | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Amadey, Clipboard Hijacker | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
ip-api.com | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
api.telegram.org | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Amadey, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Amadey, XWorm | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
TUT-ASUS | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | Blank Grabber | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | Caesium Obfuscator, STRRAT | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
3b5074b1b5d032e5620f69f9f700ff0e | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | Amadey, Stealc, Vidar | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Process: | C:\Users\user\AppData\Local\Temp\svchost.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 654 |
Entropy (8bit): | 5.380476433908377 |
Encrypted: | false |
SSDEEP: | 12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT |
MD5: | 30E4BDFC34907D0E4D11152CAEBE27FA |
SHA1: | 825402D6B151041BA01C5117387228EC9B7168BF |
SHA-256: | A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63 |
SHA-512: | 89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
File Type: | |
Category: | modified |
Size (bytes): | 64 |
Entropy (8bit): | 3.6722687970803873 |
Encrypted: | false |
SSDEEP: | 3:rRSFYJKXzovNsr42VjFYJKXzovuEXn:EFYJKDoWr5FYJKDoG+n |
MD5: | DE63D53293EBACE29F3F54832D739D40 |
SHA1: | 1BC3FEF699C3C2BB7B9A9D63C7E60381263EDA7F |
SHA-256: | A86BA2FC02725E4D97799A622EB68BF2FCC6167D439484624FA2666468BBFB1B |
SHA-512: | 10AB83C81F572DBAA99441D2BFD8EC5FF1C4BA84256ACDBD24FEB30A33498B689713EBF767500DAAAD6D188A3B9DC970CF858A6896F4381CEAC1F6A74E1603D0 |
Malicious: | false |
Reputation: | moderate, very likely benign file |
Preview: |
Process: | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 85504 |
Entropy (8bit): | 6.005743319817595 |
Encrypted: | false |
SSDEEP: | 1536:z/gewX/1Z/xxwvHTLWdEjLHJbE8/8VSpKcaBMFi4OQDYviDUpe:z/g9XNZyTLNtbE8/PNaBSi4OTze |
MD5: | F5869349B4C3C5902601673CCB454F8C |
SHA1: | 0B164E7101927FE06DDBB98B0A85BDD7757F1734 |
SHA-256: | 45B4E53E206933804C6FEBFCD5BDDC27599C63AAAA2921AFACC4D7F52A853F3A |
SHA-512: | 2B6EC9FE1F7D4F9D2884AF9D2274C62492555835533864E7C8998461C5598E6C999401D4EA33AF0404E461C6EF2671BC0C8100C6FA244A35FAAC9224BC012712 |
Malicious: | true |
Yara Hits: |
|
Antivirus: |
|
Reputation: | low |
Preview: |
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
Download File
Process: | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1052 |
Entropy (8bit): | 4.976805859422824 |
Encrypted: | false |
SSDEEP: | 12:8OqkT+4onWCedaGpMXRawJgK/PcmjAWZfE1HgUNwuLEFU44t2YZ/elFlSJmZmV:80oWhyXRDJgK/XAsfEV7kFDqyFm |
MD5: | 2C93CB9F77378DFD9BF306193F90FA57 |
SHA1: | 06D6068777218318DA632A4252ABED3022832C00 |
SHA-256: | CE266DEBADEEF70423058B8BA424B1E1E099061D7C6EF8506B769FA28837DB41 |
SHA-512: | 347CE16914FDA7CE4DB36E7B256E1F950A62B94B92FC4B2524E30B40E00F80CE55E7728AA46FC2C2CBF68B9FB89D23B595C5F5A557FA174D1148CE4E8F82B2D7 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.005743319817595 |
TrID: |
|
File name: | WV7Gj9lJ7W.exe |
File size: | 85'504 bytes |
MD5: | f5869349b4c3c5902601673ccb454f8c |
SHA1: | 0b164e7101927fe06ddbb98b0a85bdd7757f1734 |
SHA256: | 45b4e53e206933804c6febfcd5bddc27599c63aaaa2921afacc4d7f52a853f3a |
SHA512: | 2b6ec9fe1f7d4f9d2884af9d2274c62492555835533864e7c8998461c5598e6c999401d4ea33af0404e461c6ef2671bc0c8100c6fa244a35faac9224bc012712 |
SSDEEP: | 1536:z/gewX/1Z/xxwvHTLWdEjLHJbE8/8VSpKcaBMFi4OQDYviDUpe:z/g9XNZyTLNtbE8/PNaBSi4OTze |
TLSH: | A8839E2C77EA0529E5FFAFB51CF13256CB75F6231903D61F24C602CA1613A89CD81AE9 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Ag.................D...........b... ........@.. ....................................@................................ |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4162fe |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6741C995 [Sat Nov 23 12:24:53 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x162a8 | 0x53 | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x18000 | 0x4ce | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x1a000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x14304 | 0x14400 | b2be1f6f1bfc65fc3c4a3fc60f4419dd | False | 0.6075544945987654 | data | 6.069007239627802 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x18000 | 0x4ce | 0x600 | 7be5f4e146d6be4867ab3153d9398091 | False | 0.373046875 | data | 3.7127590787932885 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x1a000 | 0xc | 0x200 | d1bf243a2397e1e9e1b146da36d98cd1 | False | 0.041015625 | data | 0.08153941234324169 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x180a0 | 0x244 | data | 0.4689655172413793 | ||
RT_MANIFEST | 0x182e4 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-23T21:05:09.461983+0100 | 2853685 | ETPRO MALWARE Win32/XWorm Checkin via Telegram | 1 | 192.168.2.4 | 49731 | 149.154.167.220 | 443 | TCP |
2024-11-23T21:05:22.034934+0100 | 2855924 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:22.397821+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:22.465831+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:35.078050+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:35.078050+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:35.451440+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:35.453664+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:46.991636+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:46.994001+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:05:59.267623+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:05:59.277702+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:05.101176+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:05.101176+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:11.549167+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:11.559813+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:13.131562+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:13.137609+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:14.643237+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:14.645165+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:14.853519+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:14.855413+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:20.167925+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:20.174352+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.137384+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.181200+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.347308+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.360656+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:25.513261+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:25.519507+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:30.676427+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:30.678923+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:30.925272+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:31.032166+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:31.034909+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:31.054378+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:35.112652+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:35.112652+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.039461+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.453248+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.533917+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:41.577525+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:41.697319+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:51.654773+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:51.658601+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:51.865118+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:51.868469+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:06:52.611373+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:06:52.613190+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:04.881338+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:04.886631+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:05.114900+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:05.114900+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:06.522645+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:06.524879+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:08.971165+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:08.973095+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:21.272547+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:21.275253+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:26.353000+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:26.355168+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:28.957630+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:28.959846+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:30.374088+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:30.376164+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:35.152096+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.152096+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.583856+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:35.592877+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:44.662640+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:44.665162+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:47.910781+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:47.913494+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:48.808516+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:48.810715+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:55.471231+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:55.473795+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:07:55.962843+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:07:55.964678+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:03.766636+0100 | 2853193 | ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:04.155869+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:04.165772+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:05.095467+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:05.095467+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:06.675480+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:06.729947+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:06.899211+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:07.064909+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:17.083526+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:17.086072+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:27.724238+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:27.730954+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:27.973037+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:27.975903+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:28.743924+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:28.746440+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:35.150293+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:35.150293+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:37.728440+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:37.730791+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:42.957033+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:42.958984+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:43.203569+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:43.325613+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:48.144468+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:48.149101+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:53.227048+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:53.229056+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:57.895371+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:57.984436+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:08:58.227147+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:08:58.231872+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:04.665319+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:04.667440+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:05.094644+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:05.094644+0100 | 2852874 | ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:06.781238+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:06.782274+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
2024-11-23T21:09:19.091410+0100 | 2852870 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes | 1 | 104.198.168.179 | 1337 | 192.168.2.4 | 49732 | TCP |
2024-11-23T21:09:19.092806+0100 | 2852923 | ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) | 1 | 192.168.2.4 | 49732 | 104.198.168.179 | 1337 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 21:05:04.502347946 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:05:04.623373032 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Nov 23, 2024 21:05:04.623627901 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:05:04.624641895 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:05:04.744086027 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Nov 23, 2024 21:05:05.768939972 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Nov 23, 2024 21:05:05.810699940 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:05:07.423017979 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:07.423063040 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:07.423134089 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:07.438455105 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:07.438465118 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:08.927505970 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:08.927659988 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:08.932110071 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:08.932126045 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:08.932463884 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:08.982691050 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:08.990185976 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:09.035326958 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:09.462024927 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:09.462102890 CET | 443 | 49731 | 149.154.167.220 | 192.168.2.4 |
Nov 23, 2024 21:05:09.462165117 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:09.480619907 CET | 49731 | 443 | 192.168.2.4 | 149.154.167.220 |
Nov 23, 2024 21:05:09.601552963 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:09.721317053 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:09.726185083 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:09.759293079 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:09.885807037 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:22.034934044 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:22.154818058 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:22.397820950 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:22.454350948 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:22.465831041 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:22.585860968 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:34.348961115 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:34.654541016 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:34.967081070 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:35.078049898 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:35.123477936 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:35.208370924 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:35.208405018 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:35.208431959 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:35.451440096 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:35.453664064 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:35.574995041 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:46.623939037 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:46.748509884 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:46.991636038 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:46.994000912 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:47.117695093 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:57.727140903 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Nov 23, 2024 21:05:57.727363110 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:05:58.905085087 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:59.024771929 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:59.267622948 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:05:59.277702093 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:05:59.397228003 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:05.101176023 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:05.156215906 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:11.186728001 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:11.306243896 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:11.549166918 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:11.559813023 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:11.680452108 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:12.765496016 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:12.885066986 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:13.131561995 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:13.137609005 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:13.257400036 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.280556917 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:14.400243044 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.400299072 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:14.520039082 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.643237114 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.645164967 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:14.771534920 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.853518963 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:14.855412960 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:14.982116938 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:15.030333042 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:15.072501898 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:15.072864056 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:15.192837000 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:19.752314091 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:19.924737930 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:20.167924881 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:20.174351931 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:20.293939114 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:24.764528990 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:24.884166956 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:24.936506033 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:25.060439110 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.060731888 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:25.137383938 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.180937052 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.181200027 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:25.302761078 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.347307920 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.360656023 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:25.494723082 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.513261080 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:25.519506931 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:25.710274935 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.296180964 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:30.422569990 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.422627926 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:30.542150021 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.542195082 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:30.661890030 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.676426888 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.678922892 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:30.846009016 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.898170948 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:30.925271988 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:31.032166004 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:31.034909010 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:31.048316956 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:31.054378033 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:31.161263943 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:31.180864096 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:35.112652063 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:35.174346924 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:40.670841932 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:40.791596889 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:40.791656017 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:40.911462069 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:40.911513090 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.032097101 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.032160997 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.039460897 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.092339039 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.198108912 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.198234081 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.242760897 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.298379898 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.322329998 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.322489023 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.367224932 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.420546055 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.442017078 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.442373991 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.453248024 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.498711109 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.533617973 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.533916950 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.577524900 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.577615023 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.697247982 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:41.697319031 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:41.858051062 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:45.781008005 CET | 49730 | 80 | 192.168.2.4 | 208.95.112.1 |
Nov 23, 2024 21:06:45.900892973 CET | 80 | 49730 | 208.95.112.1 | 192.168.2.4 |
Nov 23, 2024 21:06:51.282501936 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:51.408881903 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:51.410451889 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:51.530018091 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:51.654772997 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:51.658601046 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:51.779151917 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:51.865118027 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:51.868469000 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:51.994884014 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:52.249034882 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:52.368666887 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:52.611372948 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:06:52.613189936 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:06:52.732721090 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:04.518707991 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:04.638402939 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:04.881337881 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:04.886631012 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:05.012028933 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:05.114900112 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:05.170486927 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:06.155572891 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:06.279836893 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:06.522644997 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:06.524878979 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:06.644464970 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:08.608445883 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:08.728039026 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:08.971164942 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:08.973094940 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:09.097450972 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:20.874034882 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:20.993659973 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:21.272547007 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:21.275253057 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:21.397304058 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:25.983408928 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:26.109896898 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:26.352999926 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:26.355168104 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:26.474834919 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:28.593097925 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:28.714664936 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:28.957629919 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:28.959846020 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:29.080022097 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:29.906492949 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:30.131342888 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:30.374088049 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:30.376163960 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:30.496695995 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:35.152096033 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:35.204523087 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:35.220808983 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:35.340779066 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:35.583856106 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:35.592876911 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:35.719506025 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:44.280854940 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:44.400655985 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:44.662640095 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:44.665162086 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:44.785247087 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:47.546210051 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:47.668065071 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:47.910780907 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:47.913494110 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:48.032965899 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:48.405313969 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:48.528666019 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:48.808516026 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:48.810714960 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:48.930565119 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.108582020 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:55.228528976 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.228652000 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:55.349307060 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.471230984 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.473794937 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:55.599658966 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.599739075 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:55.681655884 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.719927073 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.720041990 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:55.839534044 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.962842941 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:07:55.964678049 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:07:56.085235119 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:03.766635895 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:03.912961006 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:04.155869007 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:04.165771961 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:04.286663055 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:05.095467091 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:05.139522076 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.312210083 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.432300091 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.432358027 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.554282904 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.554339886 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.675479889 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.680387020 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.717612982 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.729947090 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:06.854443073 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.893836975 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:06.899210930 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:07.064845085 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:07.064908981 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:07.376030922 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:07.419467926 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:07.419586897 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:07.496232033 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:07.596801996 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:16.718555927 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:16.881069899 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:17.083525896 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:17.086071968 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:17.255260944 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.186995983 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:27.480506897 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.610685110 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:27.724237919 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.730190992 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.730953932 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:27.850725889 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.973037004 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:27.975903034 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:28.098886967 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:28.381328106 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:28.501120090 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:28.743923903 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:28.746439934 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:28.878722906 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:35.150293112 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:35.202054977 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:37.361479998 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:37.482907057 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:37.728440046 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:37.730791092 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:37.852983952 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:42.593313932 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:42.714163065 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:42.714314938 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:42.834227085 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:42.957032919 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:42.958983898 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:43.086577892 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:43.167869091 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:43.203568935 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:43.325335026 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:43.325613022 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:43.445072889 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:47.780561924 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:47.901140928 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:48.144468069 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:48.149101019 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:48.272279978 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:52.827641964 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:52.947546959 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:53.227047920 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:53.229055882 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:53.348989964 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:57.532789946 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:57.652384996 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:57.859863997 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:57.895370960 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:57.936532021 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:57.984184027 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:57.984436035 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:58.109973907 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:58.227147102 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:08:58.231872082 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:08:58.351387024 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:04.280719995 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:04.422152042 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:04.665318966 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:04.667439938 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:04.789544106 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:05.094644070 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:05.139681101 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:06.405713081 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:06.532107115 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:06.781238079 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:06.782274008 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:06.902178049 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:18.686984062 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:18.811279058 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:19.091409922 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Nov 23, 2024 21:09:19.092806101 CET | 49732 | 1337 | 192.168.2.4 | 104.198.168.179 |
Nov 23, 2024 21:09:19.212465048 CET | 1337 | 49732 | 104.198.168.179 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 23, 2024 21:05:04.352222919 CET | 62545 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 21:05:04.495640039 CET | 53 | 62545 | 1.1.1.1 | 192.168.2.4 |
Nov 23, 2024 21:05:07.277539015 CET | 50483 | 53 | 192.168.2.4 | 1.1.1.1 |
Nov 23, 2024 21:05:07.422281981 CET | 53 | 50483 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 23, 2024 21:05:04.352222919 CET | 192.168.2.4 | 1.1.1.1 | 0x5e9f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 23, 2024 21:05:07.277539015 CET | 192.168.2.4 | 1.1.1.1 | 0xaf94 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 23, 2024 21:05:04.495640039 CET | 1.1.1.1 | 192.168.2.4 | 0x5e9f | No error (0) | 208.95.112.1 | A (IP address) | IN (0x0001) | false | ||
Nov 23, 2024 21:05:07.422281981 CET | 1.1.1.1 | 192.168.2.4 | 0xaf94 | No error (0) | 149.154.167.220 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 208.95.112.1 | 80 | 6880 | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
Nov 23, 2024 21:05:04.624641895 CET | 80 | OUT | |
Nov 23, 2024 21:05:05.768939972 CET | 175 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49731 | 149.154.167.220 | 443 | 6880 | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-23 20:05:08 UTC | 429 | OUT | |
2024-11-23 20:05:09 UTC | 344 | IN | |
2024-11-23 20:05:09 UTC | 55 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:04:59 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\Desktop\WV7Gj9lJ7W.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xc00000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Target ID: | 1 |
Start time: | 15:05:05 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\schtasks.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff76f990000 |
File size: | 235'008 bytes |
MD5 hash: | 76CD6626DD8834BD4A42E6A565104DC2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 15:05:05 |
Start date: | 23/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 15:05:06 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Antivirus matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 15:05:18 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x3a0000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 8 |
Start time: | 15:05:26 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa40000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | false |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 9 |
Start time: | 15:06:01 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa0000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 11 |
Start time: | 15:07:01 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xa20000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 12 |
Start time: | 15:08:00 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x60000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 13 |
Start time: | 15:09:00 |
Start date: | 23/11/2024 |
Path: | C:\Users\user\AppData\Local\Temp\svchost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xc70000 |
File size: | 85'504 bytes |
MD5 hash: | F5869349B4C3C5902601673CCB454F8C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 20.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 33.3% |
Total number of Nodes: | 9 |
Total number of Limit Nodes: | 0 |
Graph
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B1779 Relevance: .9, Instructions: 907COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B6226 Relevance: .5, Instructions: 471COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B6FD2 Relevance: .5, Instructions: 458COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B24F1 Relevance: .4, Instructions: 391COMMON
Control-flow Graph
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B2259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B881779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B882259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B88130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880A68 Relevance: .3, Instructions: 277COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880EEE Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880790 Relevance: .2, Instructions: 197COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880BF3 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B882421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B880E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A1779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A2259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0A68 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0705 Relevance: .3, Instructions: 262COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0EEE Relevance: .2, Instructions: 199COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0BF2 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A2421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B1779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B2259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B05FA Relevance: .4, Instructions: 406COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0A68 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0705 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0EEE Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0BF3 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B2421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A1779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A2259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0A68 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0705 Relevance: .3, Instructions: 262COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0EEE Relevance: .2, Instructions: 199COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0BF2 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A2421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B891779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B892259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B89130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890A68 Relevance: .3, Instructions: 276COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890EEE Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890BF3 Relevance: .2, Instructions: 158COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B892421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B890E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A05FA Relevance: .4, Instructions: 409COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0A68 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0705 Relevance: .3, Instructions: 262COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0BF2 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0EEE Relevance: .1, Instructions: 122COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8A0E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B1779 Relevance: .9, Instructions: 907COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B2259 Relevance: .2, Instructions: 203COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B130D Relevance: .5, Instructions: 512COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B05FA Relevance: .4, Instructions: 406COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0A68 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0705 Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0EEE Relevance: .2, Instructions: 202COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0BF3 Relevance: .2, Instructions: 156COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0650 Relevance: .1, Instructions: 138COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0D81 Relevance: .1, Instructions: 98COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0870 Relevance: .1, Instructions: 96COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B2421 Relevance: .0, Instructions: 49COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00007FFD9B8B0E67 Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|