Windows
Analysis Report
file.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- file.exe (PID: 6544 cmdline:
"C:\Users\ user\Deskt op\file.ex e" MD5: 0ABCF5F274CF19C6F9C75954E9B6A182) - cmd.exe (PID: 2824 cmdline:
"C:\Window s\system32 \cmd.exe" /c timeout /t 10 & r d /s /q "C :\ProgramD ata\FCAKFC GCGIEG" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 2888 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - timeout.exe (PID: 6120 cmdline:
timeout /t 10 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Stealc | Stealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Vidar | Vidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser. | No Attribution |
{"C2 url": ["https://steamcommunity.com/profiles/76561199802540894", "https://t.me/fu4chmo"], "Botnet": "fc02efe1cfb2a62f36f33fff0274fb41"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 7 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
JoeSecurity_Stealc | Yara detected Stealc | Joe Security | ||
JoeSecurity_Vidar_1 | Yara detected Vidar stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T10:59:27.922634+0100 | 2044247 | 1 | Malware Command and Control Activity Detected | 49.13.32.95 | 443 | 192.168.2.5 | 49736 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T10:59:30.343771+0100 | 2051831 | 1 | Malware Command and Control Activity Detected | 49.13.32.95 | 443 | 192.168.2.5 | 49742 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T10:59:30.343541+0100 | 2049087 | 1 | A Network Trojan was detected | 192.168.2.5 | 49742 | 49.13.32.95 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Code function: | 0_2_00D63AB9 | |
Source: | Code function: | 0_2_00D592A6 | |
Source: | Code function: | 0_2_00D5B721 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00D67178 | |
Source: | Code function: | 0_2_00D66A05 | |
Source: | Code function: | 0_2_00D68D90 | |
Source: | Code function: | 0_2_00D51D70 | |
Source: | Code function: | 0_2_00D67D20 | |
Source: | Code function: | 0_2_00D5C888 | |
Source: | Code function: | 0_2_00D6785A | |
Source: | Code function: | 0_2_00D5A941 | |
Source: | Code function: | 0_2_00D5E5B9 | |
Source: | Code function: | 0_2_00D5C528 | |
Source: | Code function: | 0_2_00D5DD2A | |
Source: | Code function: | 0_2_00D5CE96 |
Source: | Code function: | 0_2_00D66E7F |
Source: | Code function: | 0_2_00D5149D | |
Source: | Code function: | 0_2_00D5149D |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: |
Source: | DNS query: |
Source: | HTTP traffic detected: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | Code function: | 0_2_00D5688F |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00D58DEA |
System Summary |
---|
Source: | Static PE information: |
Source: | Code function: | 0_2_00D5144B |
Source: | Code function: | 0_2_00D7F1B3 | |
Source: | Code function: | 0_2_00D7EA43 | |
Source: | Code function: | 0_2_00D6ACEC | |
Source: | Code function: | 0_2_00D6DC54 | |
Source: | Code function: | 0_2_00D7EDE1 | |
Source: | Code function: | 0_2_00D7F59B | |
Source: | Code function: | 0_2_00D7E5AE | |
Source: | Code function: | 0_2_00D6CEF4 | |
Source: | Code function: | 0_2_00D57FAB |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_00D63101 |
Source: | Code function: | 0_2_00D633B3 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Code function: | 0_2_00D6A132 |
Source: | Code function: | 0_2_00D809D5 | |
Source: | Code function: | 0_2_00D745BB | |
Source: | Code function: | 0_2_00D6F648 |
Source: | Code function: | 0_2_00D6A132 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | 0_2_00D517FD |
Source: | Thread sleep count: | Jump to behavior |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00D62A37 |
Source: | File Volume queried: | Jump to behavior |
Source: | Code function: | 0_2_00D67178 | |
Source: | Code function: | 0_2_00D66A05 | |
Source: | Code function: | 0_2_00D68D90 | |
Source: | Code function: | 0_2_00D51D70 | |
Source: | Code function: | 0_2_00D67D20 | |
Source: | Code function: | 0_2_00D5C888 | |
Source: | Code function: | 0_2_00D6785A | |
Source: | Code function: | 0_2_00D5A941 | |
Source: | Code function: | 0_2_00D5E5B9 | |
Source: | Code function: | 0_2_00D5C528 | |
Source: | Code function: | 0_2_00D5DD2A | |
Source: | Code function: | 0_2_00D5CE96 |
Source: | Code function: | 0_2_00D66E7F |
Source: | Code function: | 0_2_00D62C16 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_0-21498 | ||
Source: | API call chain: | graph_0-21514 | ||
Source: | API call chain: | graph_0-22624 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00D6E88C |
Source: | Code function: | 0_2_00D6A132 |
Source: | Code function: | 0_2_00D5149D | |
Source: | Code function: | 0_2_00D51492 | |
Source: | Code function: | 0_2_00D5147A | |
Source: | Code function: | 0_2_00D69D78 | |
Source: | Code function: | 0_2_00D69D79 |
Source: | Code function: | 0_2_00D628E1 |
Source: | Code function: | 0_2_00D6E88C | |
Source: | Code function: | 0_2_00D6F20C | |
Source: | Code function: | 0_2_00D78EAE |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | File source: |
Source: | Code function: | 0_2_00D612EC |
Source: | Code function: | 0_2_00D642EE | |
Source: | Code function: | 0_2_00D643C5 | |
Source: | Code function: | 0_2_00D64452 |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00D5118E |
Source: | Code function: | 0_2_00D62A37 | |
Source: | Code function: | 0_2_00D7C94C | |
Source: | Code function: | 0_2_00D7B2D0 | |
Source: | Code function: | 0_2_00D7CAE8 | |
Source: | Code function: | 0_2_00D7CA41 | |
Source: | Code function: | 0_2_00D7C3C0 | |
Source: | Code function: | 0_2_00D7CB43 | |
Source: | Code function: | 0_2_00D76C63 | |
Source: | Code function: | 0_2_00D7CDD6 | |
Source: | Code function: | 0_2_00D78DF6 | |
Source: | Code function: | 0_2_00D7FDEF | |
Source: | Code function: | 0_2_00D7B5EE | |
Source: | Code function: | 0_2_00D7CD14 | |
Source: | Code function: | 0_2_00D78D1C | |
Source: | Code function: | 0_2_00D7CEA3 | |
Source: | Code function: | 0_2_00D7A644 | |
Source: | Code function: | 0_2_00D7CE67 | |
Source: | Code function: | 0_2_00D7CE00 | |
Source: | Code function: | 0_2_00D7FF24 |
Source: | Registry key value queried: | Jump to behavior | ||
Source: | Registry key value queried: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00D6D8CB |
Source: | Code function: | 0_2_00D628AF |
Source: | Code function: | 0_2_00D6298A |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Key opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 Windows Management Instrumentation | 1 Create Account | 211 Process Injection | 1 Masquerading | OS Credential Dumping | 2 System Time Discovery | Remote Services | 1 Archive Collected Data | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Virtualization/Sandbox Evasion | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 2 Data from Local System | 4 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 211 Process Injection | Security Account Manager | 151 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 4 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | 115 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 12 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 Account Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 1 System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
Network Topology | Malvertising | Exploit Public-Facing Application | Command and Scripting Interpreter | At | At | HTML Smuggling | /etc/passwd and /etc/shadow | 3 File and Directory Discovery | Direct Cloud VM Connections | Data Staged | Web Protocols | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Internal Defacement |
IP Addresses | Compromise Infrastructure | Supply Chain Compromise | PowerShell | Cron | Cron | Dynamic API Resolution | Network Sniffing | 55 System Information Discovery | Shared Webroot | Local Data Staging | File Transfer Protocols | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | External Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
t.me | 149.154.167.99 | true | false | high | |
b2een.xyz | 49.13.32.95 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown | |
true |
| unknown | |
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
149.154.167.99 | t.me | United Kingdom | 62041 | TELEGRAMRU | false | |
49.13.32.95 | b2een.xyz | Germany | 24940 | HETZNER-ASDE | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1562215 |
Start date and time: | 2024-11-25 10:58:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 43s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 7 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | file.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/1@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: file.exe
Time | Type | Description |
---|---|---|
04:59:29 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
149.154.167.99 | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Cinoshi Stealer | Browse |
| ||
Get hash | malicious | Gurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRAT | Browse |
| ||
49.13.32.95 | Get hash | malicious | Stealc, Vidar | Browse | ||
Get hash | malicious | Stealc, Vidar | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
t.me | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
TELEGRAMRU | Get hash | malicious | MassLogger RAT | Browse |
| |
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
HETZNER-ASDE | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
37f463bf4616ecd445d4a1937da06e19 | Get hash | malicious | Remcos, GuLoader | Browse |
| |
Get hash | malicious | MassLogger RAT | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | GuLoader, Snake Keylogger, VIP Keylogger | Browse |
| ||
Get hash | malicious | Remcos, GuLoader | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Process: | C:\Users\user\Desktop\file.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1048575 |
Entropy (8bit): | 0.0 |
Encrypted: | false |
SSDEEP: | 3:8aaRaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaG:LaJ |
MD5: | B4A41A33E9575CEE3383877E7CC144F2 |
SHA1: | 6B7F929E52318DDA00F3300352FD9E8AD72E3991 |
SHA-256: | E2BFF1AB8FCD76129B0C9A35060ADD3F41D7FB450C3BE307D36D6E18B1348F21 |
SHA-512: | 73F35FB2721F6455438C22C0215869BFD8FD37BD8E397C077D29F11A274F81363153276E48AED441E8E38B14286E900371187F547A24A244B85D53D7D16D6641 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 6.610388728923203 |
TrID: |
|
File name: | file.exe |
File size: | 281'600 bytes |
MD5: | 0abcf5f274cf19c6f9c75954e9b6a182 |
SHA1: | e39e1cecaffce08ffd9388ded9e13132e1eb6d51 |
SHA256: | 54267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156 |
SHA512: | c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd |
SSDEEP: | 6144:dh0ZpFC4sffny7TuLBdZlT4DIJYdy3F8ioyrN:dh0ZpFCfB3TGyYy3uiBZ |
TLSH: | 06548D1163607C3BF2225074B70D97768A6B7C342A529F0BFBD50675AFF42E2AA1071B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......$...`...`...`.....c.x.....V.p.....b._...i.K.e...i.[.t.......c...`.........g.p.....U.a...Rich`...................PE..L....Y@g... |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x419c8d |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x674059D2 [Fri Nov 22 10:15:46 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 1 |
File Version Major: | 5 |
File Version Minor: | 1 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 1 |
Import Hash: | 0b8c3b7f5974cb002243977711d52689 |
Instruction |
---|
je 00007F71346B02E5h |
jne 00007F71346B02E3h |
mov eax, FE8EC1E8h |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax+000184E8h], edi |
add byte ptr [ebx+eax+75h], dh |
add dword ptr [eax-018BCA18h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A4018h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A4A18h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A5418h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-01885818h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A6818h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A7218h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A7C18h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-01886818h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A9018h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018A9A18h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018AA418h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-01883918h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018AB818h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018AC218h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018ACC18h], edi |
jmp far eax |
adc byte ptr [ecx-02h], bh |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax-018ADB18h], edi |
push dword ptr [ebx+eax+75h] |
add dword ptr [eax+00000000h], edi |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3d008 | 0xf0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x253000 | 0xb0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x254000 | 0x33c0 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x31000 | 0x2fc | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2fc12 | 0x2fe00 | 490359d2039bed1fe9201133edd5b2c6 | False | 0.5156351990861618 | data | 6.45972522155846 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x31000 | 0xcfdc | 0xd000 | 84b5701cb60caec63cadddf6becbc801 | False | 0.6000037560096154 | data | 6.354978643508817 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x3e000 | 0x214e8c | 0x2e00 | bc8ce1400528fb4eab6391619c257014 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x253000 | 0xb0 | 0x200 | 0bcee7bb60016f2b43c07f17c9314bb7 | False | 0.279296875 | data | 4.106523643281409 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x254000 | 0x4926 | 0x4a00 | 4745d41da41e74179f7cadb66ce2568b | False | 0.5707875844594594 | data | 5.533816308624364 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x253058 | 0x56 | ASCII text, with CRLF line terminators | English | United States | 1.0232558139534884 |
DLL | Import |
---|---|
msvcrt.dll | _mbscmp, _splitpath, memmove, strstr, strncpy, malloc, _wtoi64, ??_V@YAXPAX@Z, atexit, strcpy_s, memchr, strchr, strtok_s, ??_U@YAPAXI@Z, _time64, srand, rand, _ismbcupper, __CxxFrameHandler3 |
KERNEL32.dll | GetEnvironmentStringsW, FreeEnvironmentStringsW, GetModuleFileNameA, HeapSize, WideCharToMultiByte, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, HeapSetInformation, GetCommandLineA, ExitProcess, SetCriticalSectionSpinCount, FlsAlloc, HeapAlloc, GetCurrentProcess, HeapFree, VirtualFree, GetProcessHeap, WriteFile, VirtualAllocExNuma, Sleep, ReadFile, CreateFileW, lstrcatA, MultiByteToWideChar, GetTempPathW, GetLastError, lstrcmpiA, GetProcAddress, VirtualAlloc, GlobalMemoryStatusEx, ConvertDefaultLocale, lstrcmpiW, GetModuleHandleA, VirtualProtect, CloseHandle, lstrlenA, CreateFileA, GetFileSize, FreeLibrary, GetThreadContext, SetThreadContext, SetHandleCount, VirtualAllocEx, WriteProcessMemory, VirtualQueryEx, OpenProcess, GetComputerNameA, FileTimeToSystemTime, WaitForSingleObject, GetDriveTypeA, CreateProcessA, CreateDirectoryA, FindFirstFileA, GetLogicalDriveStringsA, FindClose, FindNextFileA, CreateThread, SetFilePointer, MapViewOfFile, UnmapViewOfFile, lstrcpynA, SystemTimeToFileTime, GetTickCount, GetLocalTime, CreateFileMappingA, GetFileInformationByHandle, lstrcpyA, TlsGetValue, TlsAlloc, GetModuleFileNameW, GetStdHandle, GetModuleHandleW, HeapDestroy, HeapCreate, RtlUnwind, EnterCriticalSection, FatalAppExitA, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, DecodePointer, EncodePointer, IsDebuggerPresent, SetUnhandledExceptionFilter, HeapReAlloc, GetFileType, QueryPerformanceCounter, GetStartupInfoW, GetCurrentProcessId, GetSystemTimeAsFileTime, LCMapStringW, ReadProcessMemory, GetStringTypeW, UnhandledExceptionFilter, TerminateProcess, TlsFree, RaiseException, IsValidLocale, EnumSystemLocalesA, GetLocaleInfoA, GetUserDefaultLCID, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetCurrentThread, IsProcessorFeaturePresent, SetConsoleCtrlHandler, InterlockedExchange, GetLocaleInfoW, LoadLibraryW, TlsSetValue |
USER32.dll | wsprintfA, GetDesktopWindow, OpenDesktopA, CreateDesktopA, CloseDesktop, OpenInputDesktop, wsprintfW, IsDialogMessageW, MessageBoxA, GetWindowLongW, ReleaseDC, GetWindowContextHelpId, GetCursorPos, SetThreadDesktop, RegisterClassW, IsWindowVisible, CharToOemA |
GDI32.dll | CreateDCA, GetDeviceCaps |
ADVAPI32.dll | RegGetValueA, RegOpenKeyExA, GetUserNameA, GetCurrentHwProfileA |
SHELL32.dll | SHFileOperationA, SHGetFolderPathA |
ole32.dll | CoInitializeSecurity, CoSetProxyBlanket, CoCreateInstance, CoInitializeEx |
OLEAUT32.dll | VariantClear, SysFreeString, VariantInit, SysAllocString |
PSAPI.DLL | GetModuleBaseNameA, EnumProcessModules |
WS2_32.dll | connect, WSAStartup, getaddrinfo, htons, WSACleanup, recv, socket, freeaddrinfo, closesocket, send |
SHLWAPI.dll | PathFileExistsA |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-11-25T10:59:27.922634+0100 | 2044247 | ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config | 1 | 49.13.32.95 | 443 | 192.168.2.5 | 49736 | TCP |
2024-11-25T10:59:30.343541+0100 | 2049087 | ET MALWARE Win32/Stealc/Vidar Stealer Style Headers In HTTP POST | 1 | 192.168.2.5 | 49742 | 49.13.32.95 | 443 | TCP |
2024-11-25T10:59:30.343771+0100 | 2051831 | ET MALWARE Win32/Stealc/Vidar Stealer Active C2 Responding with plugins Config M1 | 1 | 49.13.32.95 | 443 | 192.168.2.5 | 49742 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 10:59:15.464981079 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:15.465008974 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:15.465178013 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:15.494321108 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:15.494339943 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:16.913274050 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:16.913341045 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:16.971658945 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:16.971677065 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:16.972166061 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:16.973320007 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:16.975517988 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.023334980 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.474513054 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.474541903 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.474567890 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.474586010 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.474601984 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.474616051 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.474641085 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.474754095 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.477062941 CET | 49709 | 443 | 192.168.2.5 | 149.154.167.99 |
Nov 25, 2024 10:59:17.477073908 CET | 443 | 49709 | 149.154.167.99 | 192.168.2.5 |
Nov 25, 2024 10:59:17.820622921 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:17.820669889 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:17.820777893 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:17.821099997 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:17.821111917 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.156826019 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.156904936 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.168950081 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.168956041 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.169222116 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.169271946 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.169702053 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.211332083 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.886327028 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.886410952 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.886423111 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.886451006 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.889115095 CET | 49717 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.889133930 CET | 443 | 49717 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.895150900 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.895200014 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:20.895267963 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.895472050 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:20.895484924 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:22.343857050 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:22.343955040 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:22.344664097 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:22.344675064 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:22.350766897 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:22.350774050 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:23.242762089 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:23.242835999 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:23.242842913 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.242922068 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.243089914 CET | 49724 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.243108034 CET | 443 | 49724 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:23.250118971 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.250154972 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:23.250231028 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.250453949 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:23.250464916 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:24.653515100 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:24.653575897 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:24.654231071 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:24.654244900 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:24.655814886 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:24.655819893 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.551510096 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.551537037 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.551599026 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.551631927 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.551675081 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.551973104 CET | 49730 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.551990986 CET | 443 | 49730 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.560493946 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.560520887 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:25.560615063 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.560800076 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:25.560807943 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.005903006 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.005995989 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.006544113 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.006547928 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.008147955 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.008152962 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.922406912 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.922435045 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.922466993 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.922475100 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.922492027 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.922525883 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.922534943 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.922571898 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.923508883 CET | 49736 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.923522949 CET | 443 | 49736 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.929955959 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.929990053 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:27.930061102 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.930232048 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:27.930243015 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:29.426024914 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:29.426116943 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:29.426934958 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:29.426943064 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:29.428666115 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:29.428673029 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:30.343578100 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:30.343653917 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.343662024 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:30.343707085 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.343938112 CET | 49742 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.343955040 CET | 443 | 49742 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:30.419604063 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.419682980 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:30.419766903 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.419992924 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:30.420041084 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.411920071 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.411956072 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.412028074 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.412336111 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.412350893 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.860424995 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.860976934 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.861372948 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.861398935 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.863042116 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.863058090 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:31.863127947 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:31.863145113 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.856925964 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.857012033 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.857557058 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.857568026 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.868839979 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.868849039 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.935924053 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.936001062 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:32.936013937 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.936063051 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.952091932 CET | 49748 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:32.952121973 CET | 443 | 49748 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:33.416012049 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:33.416080952 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.416088104 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:33.416134119 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.422344923 CET | 49754 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.422363997 CET | 443 | 49754 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:33.440625906 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.440668106 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:33.440740108 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.441050053 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:33.441073895 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:34.885910988 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:34.885977030 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:34.886413097 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:34.886425018 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:34.888118029 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:34.888129950 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.824454069 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.824476004 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.824549913 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.824558020 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.824618101 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.864073992 CET | 49760 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.864097118 CET | 443 | 49760 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.942848921 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.942902088 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:35.943048000 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.943484068 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:35.943526030 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:37.350146055 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:37.350230932 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:37.350670099 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:37.350689888 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:37.352510929 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:37.352525949 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.260823011 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.260852098 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.260930061 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.260932922 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.260934114 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.261008978 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.277553082 CET | 49766 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.277602911 CET | 443 | 49766 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.474679947 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.474740028 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:38.474797964 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.475101948 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:38.475122929 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:39.968992949 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:39.969141006 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:39.969624996 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:39.969652891 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:39.971324921 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:39.971338034 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:40.873087883 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:40.873193026 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:40.873193026 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:40.873241901 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:40.874603987 CET | 49772 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:40.874629974 CET | 443 | 49772 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:41.516524076 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:41.516577005 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:41.516784906 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:41.517090082 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:41.517096043 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.011919022 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.011996031 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.012471914 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.012476921 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014466047 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014471054 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014523029 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014539957 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014583111 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014589071 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014657974 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014664888 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014682055 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014694929 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014714003 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014720917 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014789104 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014796972 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.014813900 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014890909 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014897108 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014909029 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.014987946 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:43.017482996 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:43.017489910 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:44.938520908 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:44.938628912 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:44.938702106 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.938741922 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.939101934 CET | 49778 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.939121962 CET | 443 | 49778 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:44.986538887 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.986589909 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:44.986660957 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.986874104 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:44.986882925 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:46.428802967 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:46.428886890 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:46.429261923 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:46.429280996 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:46.431241989 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:46.431256056 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.352756023 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.352849007 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.352915049 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.352955103 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.352987051 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.353022099 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.353061914 CET | 49789 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.353095055 CET | 443 | 49789 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.354494095 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.354533911 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:47.354635000 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.354825020 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:47.354840040 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:48.805393934 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:48.805474043 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:48.805784941 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:48.805790901 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:48.807348013 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:48.807353020 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:49.735449076 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:49.735536098 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:49.735560894 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:49.735609055 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:49.735677004 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:49.735702991 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Nov 25, 2024 10:59:49.735713005 CET | 443 | 49795 | 49.13.32.95 | 192.168.2.5 |
Nov 25, 2024 10:59:49.735727072 CET | 49795 | 443 | 192.168.2.5 | 49.13.32.95 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Nov 25, 2024 10:59:15.319109917 CET | 64308 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 25, 2024 10:59:15.455929041 CET | 53 | 64308 | 1.1.1.1 | 192.168.2.5 |
Nov 25, 2024 10:59:17.492124081 CET | 53231 | 53 | 192.168.2.5 | 1.1.1.1 |
Nov 25, 2024 10:59:17.819901943 CET | 53 | 53231 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Nov 25, 2024 10:59:15.319109917 CET | 192.168.2.5 | 1.1.1.1 | 0x26fc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Nov 25, 2024 10:59:17.492124081 CET | 192.168.2.5 | 1.1.1.1 | 0xcafe | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Nov 25, 2024 10:59:15.455929041 CET | 1.1.1.1 | 192.168.2.5 | 0x26fc | No error (0) | 149.154.167.99 | A (IP address) | IN (0x0001) | false | ||
Nov 25, 2024 10:59:17.819901943 CET | 1.1.1.1 | 192.168.2.5 | 0xcafe | No error (0) | 49.13.32.95 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49709 | 149.154.167.99 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:16 UTC | 86 | OUT | |
2024-11-25 09:59:17 UTC | 512 | IN | |
2024-11-25 09:59:17 UTC | 12310 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49717 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:20 UTC | 224 | OUT | |
2024-11-25 09:59:20 UTC | 158 | IN | |
2024-11-25 09:59:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49724 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:22 UTC | 316 | OUT | |
2024-11-25 09:59:22 UTC | 256 | OUT | |
2024-11-25 09:59:23 UTC | 158 | IN | |
2024-11-25 09:59:23 UTC | 69 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49730 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:24 UTC | 316 | OUT | |
2024-11-25 09:59:24 UTC | 331 | OUT | |
2024-11-25 09:59:25 UTC | 158 | IN | |
2024-11-25 09:59:25 UTC | 2192 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49736 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:27 UTC | 316 | OUT | |
2024-11-25 09:59:27 UTC | 331 | OUT | |
2024-11-25 09:59:27 UTC | 158 | IN | |
2024-11-25 09:59:27 UTC | 5685 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49742 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:29 UTC | 316 | OUT | |
2024-11-25 09:59:29 UTC | 332 | OUT | |
2024-11-25 09:59:30 UTC | 158 | IN | |
2024-11-25 09:59:30 UTC | 119 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49748 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:31 UTC | 317 | OUT | |
2024-11-25 09:59:31 UTC | 5521 | OUT | |
2024-11-25 09:59:32 UTC | 158 | IN | |
2024-11-25 09:59:32 UTC | 12 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49754 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:32 UTC | 235 | OUT | |
2024-11-25 09:59:33 UTC | 143 | IN | |
2024-11-25 09:59:33 UTC | 146 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49760 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:34 UTC | 316 | OUT | |
2024-11-25 09:59:34 UTC | 331 | OUT | |
2024-11-25 09:59:35 UTC | 158 | IN | |
2024-11-25 09:59:35 UTC | 2228 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.5 | 49766 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:37 UTC | 316 | OUT | |
2024-11-25 09:59:37 UTC | 331 | OUT | |
2024-11-25 09:59:38 UTC | 158 | IN | |
2024-11-25 09:59:38 UTC | 1524 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
10 | 192.168.2.5 | 49772 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:39 UTC | 316 | OUT | |
2024-11-25 09:59:39 UTC | 461 | OUT | |
2024-11-25 09:59:40 UTC | 158 | IN | |
2024-11-25 09:59:40 UTC | 12 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
11 | 192.168.2.5 | 49778 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:43 UTC | 319 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16355 | OUT | |
2024-11-25 09:59:43 UTC | 16223 | OUT | |
2024-11-25 09:59:44 UTC | 158 | IN | |
2024-11-25 09:59:44 UTC | 12 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
12 | 192.168.2.5 | 49789 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:46 UTC | 316 | OUT | |
2024-11-25 09:59:46 UTC | 331 | OUT | |
2024-11-25 09:59:47 UTC | 158 | IN | |
2024-11-25 09:59:47 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
13 | 192.168.2.5 | 49795 | 49.13.32.95 | 443 | 6544 | C:\Users\user\Desktop\file.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-11-25 09:59:48 UTC | 316 | OUT | |
2024-11-25 09:59:48 UTC | 331 | OUT | |
2024-11-25 09:59:49 UTC | 158 | IN | |
2024-11-25 09:59:49 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 04:58:54 |
Start date: | 25/11/2024 |
Path: | C:\Users\user\Desktop\file.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 281'600 bytes |
MD5 hash: | 0ABCF5F274CF19C6F9C75954E9B6A182 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 04:59:49 |
Start date: | 25/11/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 04:59:49 |
Start date: | 25/11/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 04:59:49 |
Start date: | 25/11/2024 |
Path: | C:\Windows\SysWOW64\timeout.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe50000 |
File size: | 25'088 bytes |
MD5 hash: | 976566BEEFCCA4A159ECBDB2D4B1A3E3 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 15.3% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 3.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 16 |
Graph
Function 00D6A132 Relevance: 231.5, APIs: 121, Strings: 11, Instructions: 518libraryloaderCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D66A05 Relevance: 49.3, APIs: 24, Strings: 4, Instructions: 297filestringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D67D20 Relevance: 37.0, APIs: 18, Strings: 3, Instructions: 205stringfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5688F Relevance: 24.7, APIs: 11, Strings: 3, Instructions: 161networkfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51D70 Relevance: 23.3, APIs: 12, Strings: 1, Instructions: 529fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68D90 Relevance: 22.9, APIs: 11, Strings: 2, Instructions: 151fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D67178 Relevance: 22.9, APIs: 12, Strings: 1, Instructions: 140stringfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D66E7F Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 144stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D642EE Relevance: 12.3, APIs: 6, Strings: 1, Instructions: 39processCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D62A37 Relevance: 10.6, APIs: 5, Strings: 1, Instructions: 82memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63101 Relevance: 6.1, APIs: 4, Instructions: 56processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D628E1 Relevance: 4.5, APIs: 3, Instructions: 22memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D628AF Relevance: 4.5, APIs: 3, Instructions: 19memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D62C16 Relevance: 3.0, APIs: 2, Instructions: 21COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5149D Relevance: 1.3, APIs: 1, Instructions: 40stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D553AA Relevance: 72.3, APIs: 25, Strings: 16, Instructions: 573stringnetworkmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D55E61 Relevance: 53.0, APIs: 20, Strings: 10, Instructions: 469networkstringmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D658C3 Relevance: 49.7, APIs: 2, Strings: 26, Instructions: 674stringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68705 Relevance: 37.0, APIs: 8, Strings: 13, Instructions: 249sleepCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51656 Relevance: 35.1, APIs: 18, Strings: 2, Instructions: 129memoryfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D54A56 Relevance: 33.6, APIs: 12, Strings: 7, Instructions: 378networkstringfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63463 Relevance: 33.4, APIs: 11, Strings: 8, Instructions: 143memorycomtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6820C Relevance: 33.4, APIs: 10, Strings: 9, Instructions: 114stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D652CC Relevance: 26.5, APIs: 13, Strings: 2, Instructions: 278stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5515F Relevance: 24.7, APIs: 13, Strings: 1, Instructions: 161networkmemoryfileCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D635F3 Relevance: 24.6, APIs: 7, Strings: 7, Instructions: 114comCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D62E5F Relevance: 22.9, APIs: 10, Strings: 3, Instructions: 155registrystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D625FE Relevance: 19.4, APIs: 8, Strings: 3, Instructions: 110memorystringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63BB1 Relevance: 18.1, APIs: 12, Instructions: 147COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68F92 Relevance: 18.1, APIs: 8, Strings: 2, Instructions: 592networksleepCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68615 Relevance: 17.6, APIs: 5, Strings: 5, Instructions: 79stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51AA8 Relevance: 14.1, APIs: 6, Strings: 2, Instructions: 129stringfileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63230 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 48registryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51A41 Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 35registrymemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6278C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40registrymemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D62805 Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 36registrymemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D510E0 Relevance: 9.1, APIs: 6, Instructions: 54memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D632E0 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 60stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D62D75 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 45memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68B15 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 55stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68BE6 Relevance: 4.6, APIs: 3, Instructions: 70sleepsynchronizationthreadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63EE1 Relevance: 4.5, APIs: 3, Instructions: 36COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6807F Relevance: 3.1, APIs: 2, Instructions: 101stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D68D06 Relevance: 3.0, APIs: 1, Strings: 1, Instructions: 45stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D69C8D Relevance: 1.6, APIs: 1, Instructions: 133COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63A18 Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D639EE Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D64387 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63A7B Relevance: 1.3, APIs: 1, Instructions: 32memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5A941 Relevance: 67.3, APIs: 29, Strings: 9, Instructions: 780filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D57FAB Relevance: 60.2, APIs: 28, Strings: 6, Instructions: 715networkCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6785A Relevance: 29.9, APIs: 15, Strings: 2, Instructions: 179filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D58DEA Relevance: 29.9, APIs: 14, Strings: 3, Instructions: 149stringsleepprocessCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D612EC Relevance: 24.6, APIs: 12, Strings: 2, Instructions: 130threadinjectionmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5CE96 Relevance: 19.7, APIs: 7, Strings: 4, Instructions: 420fileCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5DD2A Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 298filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5E5B9 Relevance: 16.0, APIs: 8, Strings: 1, Instructions: 229fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5C888 Relevance: 14.3, APIs: 7, Strings: 1, Instructions: 319fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5C528 Relevance: 13.7, APIs: 9, Instructions: 217fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D643C5 Relevance: 9.0, APIs: 6, Instructions: 37processCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7C94C Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 54COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D592A6 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 48memoryencryptionCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D8CB Relevance: 3.1, APIs: 2, Instructions: 63timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5144B Relevance: 3.0, APIs: 2, Instructions: 22nativeCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7CDD6 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D78EAE Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7E5AE Relevance: .5, Instructions: 489COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7F59B Relevance: .4, Instructions: 355COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7F1B3 Relevance: .3, Instructions: 349COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7EDE1 Relevance: .3, Instructions: 332COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7EA43 Relevance: .3, Instructions: 326COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6ACEC Relevance: .2, Instructions: 178COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6CEF4 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5118E Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D69D78 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D69D79 Relevance: .0, Instructions: 14COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5147A Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51492 Relevance: .0, Instructions: 3COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5F6CB Relevance: 70.3, APIs: 30, Strings: 10, Instructions: 292stringmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5B85F Relevance: 58.0, APIs: 32, Strings: 1, Instructions: 211stringmemoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5F182 Relevance: 56.3, APIs: 18, Strings: 14, Instructions: 325registryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D59777 Relevance: 42.2, APIs: 23, Strings: 1, Instructions: 195memoryfilestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D76397 Relevance: 42.1, APIs: 19, Strings: 5, Instructions: 109libraryloadermemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D51917 Relevance: 36.8, APIs: 2, Strings: 19, Instructions: 56stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5BB2E Relevance: 33.3, APIs: 22, Instructions: 315stringmemoryfileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D052 Relevance: 28.1, APIs: 9, Strings: 7, Instructions: 65stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D58B39 Relevance: 26.4, APIs: 10, Strings: 5, Instructions: 177stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D656FF Relevance: 26.4, APIs: 14, Strings: 1, Instructions: 127stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D57E0E Relevance: 19.4, APIs: 7, Strings: 4, Instructions: 122networkCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D7A394 Relevance: 18.1, APIs: 12, Instructions: 95COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D515D6 Relevance: 18.0, APIs: 12, Instructions: 50windowmemoryregistryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D173 Relevance: 15.9, APIs: 8, Strings: 1, Instructions: 175fileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5EB72 Relevance: 15.9, APIs: 7, Strings: 2, Instructions: 108stringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D631BF Relevance: 14.0, APIs: 7, Strings: 1, Instructions: 45memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D77E8D Relevance: 13.6, APIs: 9, Instructions: 64COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D590ED Relevance: 12.3, APIs: 4, Strings: 3, Instructions: 27libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5A632 Relevance: 12.2, APIs: 4, Strings: 4, Instructions: 222stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D64EA7 Relevance: 9.1, APIs: 6, Instructions: 110stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D593A4 Relevance: 9.1, APIs: 2, Strings: 4, Instructions: 105stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D594DB Relevance: 8.9, APIs: 2, Strings: 3, Instructions: 115memoryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D59ECA Relevance: 7.7, APIs: 2, Strings: 3, Instructions: 192stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D403 Relevance: 7.6, APIs: 5, Instructions: 99fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D639BD Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 18memoryCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D5E401 Relevance: 6.1, APIs: 2, Strings: 2, Instructions: 125stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D7A8 Relevance: 6.1, APIs: 4, Instructions: 98timeCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D6D562 Relevance: 6.1, APIs: 4, Instructions: 91fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D640F6 Relevance: 6.1, APIs: 4, Instructions: 88COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D683AE Relevance: 6.1, APIs: 4, Instructions: 73stringCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D63DFD Relevance: 6.0, APIs: 4, Instructions: 34fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00D64841 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 124processCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|