Analysis Report ioir.png.dll
Overview
General Information
Detection
Score: | 68 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | ||
JoeSecurity_Ursnif | Yara detected Ursnif | Joe Security | ||
Click to see the 31 entries |
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Compliance: |
---|
Uses 32bit PE files | Show sources |
Source: | Static PE information: |
Uses new MSVCR Dlls | Show sources |
Source: | File opened: |
Uses secure TLS version for HTTPS connections | Show sources |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Binary contains paths to debug symbols | Show sources |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: |
Source: | JA3 fingerprint: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Key, Mouse, Clipboard, Microphone and Screen Capturing: |
---|
Yara detected Ursnif | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Window created: | ||
Source: | Window created: |
E-Banking Fraud: |
---|
Yara detected Ursnif | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
System Summary: |
---|
Writes or reads registry keys via WMI | Show sources |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Writes registry values via WMI | Show sources |
Source: | WMI Registry write: | ||
Source: | WMI Registry write: | ||
Source: | WMI Registry write: | ||
Source: | WMI Registry write: | ||
Source: | WMI Registry write: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Key opened: | ||
Source: | Key opened: |
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | File read: | Jump to behavior | ||
Source: | File read: | Jump to behavior |
Source: | Process created: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Key value queried: |
Source: | File opened: |
Source: | Window detected: |
Source: | File opened: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Hooking and other Techniques for Hiding and Protection: |
---|
Yara detected Ursnif | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Registry key monitored for changes: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion: |
---|
Contains functionality to detect sleep reduction / modifications | Show sources |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: |
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process queried: | ||
Source: | Process queried: |
Source: | Code function: |
Source: | Code function: |
Source: | Memory protected: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | WMI Queries: |
Stealing of Sensitive Information: |
---|
Yara detected Ursnif | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality: |
---|
Yara detected Ursnif | Show sources |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation211 | Application Shimming1 | Application Shimming1 | Disable or Modify Tools1 | Input Capture11 | System Time Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel12 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Native API1 | Boot or Logon Initialization Scripts | Process Injection2 | Deobfuscate/Decode Files or Information1 | LSASS Memory | File and Directory Discovery2 | Remote Desktop Protocol | Screen Capture1 | Exfiltration Over Bluetooth | Non-Application Layer Protocol1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information2 | Security Account Manager | System Information Discovery26 | SMB/Windows Admin Shares | Input Capture11 | Automated Exfiltration | Application Layer Protocol2 | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Software Packing1 | NTDS | Query Registry1 | Distributed Component Object Model | Clipboard Data3 | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Masquerading1 | LSA Secrets | Security Software Discovery141 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Virtualization/Sandbox Evasion1 | Cached Domain Credentials | Virtualization/Sandbox Evasion1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Process Injection2 | DCSync | Process Discovery1 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | Rundll321 | Proc Filesystem | Application Window Discovery11 | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue | |
Exploit Public-Facing Application | PowerShell | At (Linux) | At (Linux) | Masquerading | /etc/passwd and /etc/shadow | Remote System Discovery1 | Software Deployment Tools | Data Staged | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol | Web Protocols | Rogue Cellular Base Station | Data Destruction |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
42% | Virustotal | Browse | ||
41% | ReversingLabs | Win32.Trojan.Graftor |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Kazy.4159236 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Patched.Ren.Gen | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | HEUR/AGEN.1108767 | Download File | ||
100% | Avira | TR/Kazy.4159236 | Download File | ||
100% | Avira | HEUR/AGEN.1108767 | Download File | ||
100% | Avira | TR/Patched.Ren.Gen | Download File |
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Domains and IPs |
---|
Contacted Domains |
---|
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
topitophug.xyz | 45.133.216.103 | true | false | unknown |
URLs from Memory and Binaries |
---|
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| low | ||
false |
| unknown | ||
false | high | |||
false |
| unknown |
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
45.133.216.103 | unknown | Russian Federation | 202933 | CLOUDSOLUTIONSRU | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 349160 |
Start date: | 05.02.2021 |
Start time: | 15:10:14 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 8m 38s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | ioir.png.dll |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 27 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal68.troj.evad.winDLL@9/19@2/1 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
15:11:11 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
No context |
---|
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
CLOUDSOLUTIONSRU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
9e10692f1b7f78228b2d4e424db3a98c | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13306 |
Entropy (8bit): | 3.7712108697295097 |
Encrypted: | false |
SSDEEP: | 192:Bdie0oX5aoHBUZMX4jed+GbfY/u7sXS274ItWcD:bioXEQBUZMX4jeQ/u7sXX4ItWcD |
MD5: | 463C84121A048AD2BA765E6FCB8865BC |
SHA1: | 0C05AC19A543BD8FFA7B1805665CE9355FCDA851 |
SHA-256: | EE13D7B66DC61E8A56A3BAD31BB9886CB23AB1FB397A373B0F71777A7922142C |
SHA-512: | 6C0684501DCACB2E3953AE3A54A8E819E4DFF9F9FDE6806D541CB4ACC4FAF3CB10716DE2C27B1D99F7E3D576A0A37D1705D7563BC56A4C9FF66F9C4BB075BBC3 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 48792 |
Entropy (8bit): | 2.1558382421313653 |
Encrypted: | false |
SSDEEP: | 192:iowXW8tpYtIAKw+OHRiMMC+n2V77O9T4teM9YaEsJI1iJnDmSBF:MXW8tpY7XdiMFb9w4teEYzsJVq8F |
MD5: | D538781FC8355DF6F2667C82DE023F70 |
SHA1: | ED3A12ABADA87B9512C258D0BD73FA024E6B52E1 |
SHA-256: | 13118910E6B24D2D3244B76EC5543912ADC6D7FA9BABC45C849516608E31994E |
SHA-512: | 8FBD9221B6BCD07BFE27E3304F89958027BE31C7B1E91C438608F4A4FD62BDBA04D77B2449EDA3B77240C479AFDE8937A743E92B339086E31F13BF10816D7612 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8330 |
Entropy (8bit): | 3.7035645163569257 |
Encrypted: | false |
SSDEEP: | 192:Rrl7r3GLNiaG6h6Ygd6cIMgmfTjSx+prw89b4b+sf5ejm:RrlsNir6h6Yq6ggmfTjS44b9f86 |
MD5: | B7DA6E395939A41BFE50A321C6D323DC |
SHA1: | 173E5842A3201431E9740B084F5DB43B30EDC59B |
SHA-256: | 68CBCC78BF4202BC2F6A4D1EB517525F6186F5EF5E6403640D9DDEB4B5348011 |
SHA-512: | F22C4A66A03EB697FE1B4A51A0F96EE1CDCE004BFAADB6C5285CEDAC0C4E435833FCD72F1F6293F30495E4BB9BB6928FA6284134A04E747500F02E27F966ACCA |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4669 |
Entropy (8bit): | 4.500792046521803 |
Encrypted: | false |
SSDEEP: | 48:cvIwSD8zscJgtWI968WSC8B88fm8M4JCdsjZFT+q8/Oz44SrSkd:uITfa91SNvJ1/54DWkd |
MD5: | 513D059A55EF614427FDC28717F581FB |
SHA1: | 1A0F3336B77A7FF565C088BB040F5EE0C5674C6B |
SHA-256: | DA3C44AD49F98340DBF30FE2FD22514889BC0144D7369F132EF3A3A073F3228F |
SHA-512: | FB88AD7652000F59D2C891864E9F98525D7A9C99A199FE897467D5FCF83348E0E152FAB9A9374F0FEF06130E65A7B001B2AA876BDFFF0D01C0F3A4FBC33A4263 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 41560 |
Entropy (8bit): | 1.9329562369765705 |
Encrypted: | false |
SSDEEP: | 384:rFskBUzInE8/7E2DQeoBUoIEABmPP3Gem:fE8jE2DQpBHIfBSPWem |
MD5: | 59DFE51ACAC3DC82DE1F9E9FF0F1A687 |
SHA1: | E94CBCF03C7EE483A5ABF8006763E8E558C0EE74 |
SHA-256: | 0A086E3BE77A657EFF1205D166F1659D38FA15A4390BBBAECCC6E77AF6D77F23 |
SHA-512: | EBE4D91785442F032E4A2EAF15F9FE9A0ED63DC7F5D049416FF702EA42CF9D8450C7A07ADA9F68C7CEBDB940DA80202654B52AF5FA476E3006626070DDC573B9 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 16984 |
Entropy (8bit): | 1.5754992114408473 |
Encrypted: | false |
SSDEEP: | 48:IwdGcprUGwpaaG4pQO7GrapbS0xrGQpB9sGHHpcksTGUpG:rDZsQa6OvBSYFjJ2kkA |
MD5: | 9D4D9A4FF0756DA534B51497A1D1719B |
SHA1: | 74AE037703FEAEB0DB156F7256EDEBB0058E4109 |
SHA-256: | B89D970145E20B222A87A08B0CEC456D0308D5A0D74F8EB0B0FFCFB3A89571D6 |
SHA-512: | D4DA58D8A400ECC64D0CA61FA284B8C7D3C344279927C8D6F42B20A0838B473E385FA619FE21CA4F69E98808A1946D1E476F129C93AAE13A4FB2FAB951117C85 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 26256 |
Entropy (8bit): | 1.6642506081018853 |
Encrypted: | false |
SSDEEP: | 48:IwrGcprq7GwpaGG4pQuGrapbSKrGQpBKGHHpcRsTGUp83GzYpmLEYGop2JnOGiXD:rxZmQ26gBSKFjR2RkW1MYY8ilaRA |
MD5: | 7D46C19E4F6FB8B0F672D771F9DEBB3D |
SHA1: | F1EA00C6ABB0C8A54D29FA6CD334B395DD780497 |
SHA-256: | 35CE987AF57E0B56BE1D1EABDA3EDF343CEDDD15461AFD47E5B0B88C37BBCAE1 |
SHA-512: | C41B0DB9B9AA6B1520F7ADCE787DE17ED503BD273E4BC44C2151ADD92DC3A9F6674FDA6E30743918724DC8AEED2A1A261753C709D035FA23DE926B87A39B5660 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.062751518107858 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxOEn1nWimI002EtM3MHdNMNxOEn1nWimI00OYGVbkEtMb:2d6NxOG1SZHKd6NxOG1SZ7YLb |
MD5: | 0CCC032CF24BAECD02966BFA35CFEC9A |
SHA1: | D3DC1764ED72EEA6BBEC006A37C6391178AC4F9D |
SHA-256: | CEC3931C2D9ABA751D0A659645012AA0EB397B6B68A1C1904A9D59037598B404 |
SHA-512: | B7488364AE0E6782F8D657717FD2BBFB6BC33902DA489A9C9A4630028BEE616F09E03E2359CBC4E823560361A676A05FCA4195928C4A91B8E53EE4E6428FAE1C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.118031973224068 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxe2kYCXYDzCXYWnWimI002EtM3MHdNMNxe2kYCXYDzCXYWnWimI00OYGv:2d6NxrZDtWSZHKd6NxrZDtWSZ7Yza7b |
MD5: | 91823A87212DABC8ED12F03532097F23 |
SHA1: | E45CBC26A1C8F98D1734D1570EADEE978F96781A |
SHA-256: | 5081C81723D6ED587C4F09DB8A51E0C1DC773C3CF92E5AE340B9A8A0E5251A09 |
SHA-512: | D2A1BFB277428BA930269A15D0BE73D99A0E7F3A37CD6F52D5274B30998EF3198F6E48623C8AFC0E9F937E820CA4564DB9BC6CF6B24E9BE8585B85736C708B2F |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 662 |
Entropy (8bit): | 5.084621789248435 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxvLn1nWimI002EtM3MHdNMNxvLnLU4nWimI00OYGmZEtMb:2d6Nxvj1SZHKd6NxvjTSZ7Yjb |
MD5: | 19E534F010FE9794ABAA6FD8A5D7821C |
SHA1: | 1CCC1A92A4636F9B06D0B28AC2CF2A7786BC6EB5 |
SHA-256: | 4FC3DF159DC956A9DADB427E743EBFB4A3466FB616E0C47A74326757615A9424 |
SHA-512: | 638DF1AC70867B83EC233B989790B6AD9F8B914696C53202DBF86A206FEBD00FE99AADACDBF5DA93B959907263C069DAFE26F6FDB9EBA0FFFD234228D46E4859 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 647 |
Entropy (8bit): | 5.059389646415428 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxiYlXgzlXPnWimI002EtM3MHdNMNxiYlXgzlXPnWimI00OYGd5EtMb:2d6Nx8xSZHKd6Nx8xSZ7YEjb |
MD5: | B6FA3DCE091C867063EF32063AE6B81A |
SHA1: | D3195C1E01BB1972530342F0D52B9BCBAA6E7B2F |
SHA-256: | DD68DE3424C37828039DADA7C67D4ECA2A8A3737CC0133B5B75E3D7555695B2A |
SHA-512: | 770ECC43E6AC205086D783C4D188CB18AA3DA1330FF7B8D5D3517B5F0F6D704DB95C0670D09982F366357F7C69C471863416B9AC20E00FF8F1398544EA430A7C |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.09564550749467 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxhGwuURLU4nWimI002EtM3MHdNMNxhGwuURLU4nWimI00OYG8K075EtMb:2d6NxQETSZHKd6NxQETSZ7YrKajb |
MD5: | 9094C1234D482B9A1915A49405753F96 |
SHA1: | 0C709B00AFD7AA6894765AFE0AF46DA00F5F3469 |
SHA-256: | 6894497DA11891747996D117ABE91AE6B019DDDAC013B35922D10D81724143A1 |
SHA-512: | A9FB71A71B8F649D2684A74091FC1631EF6A463D9AEF74410009B8D1CABE8AF10A85499C63363F09200455ED31D47CA446D9B0CFA8497CCE88ECB224535C29C2 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.045598941850099 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNx0nYlXgzlXPnWimI002EtM3MHdNMNx0nYlXgzlXPnWimI00OYGxEtMb:2d6Nx07xSZHKd6Nx07xSZ7Ygb |
MD5: | 01E3BA054B9DF29082673F4498AA3ACC |
SHA1: | A9484E7746BB7DB069286B2E1016079E091C11D9 |
SHA-256: | 6AE9E4CE2A51C5B2FB6A33D82BD12A2329F54131ECD6C139855E6B2E0A3CF394 |
SHA-512: | B98579B114028226833747A26AEA6D0CD129F5B99F49B1069DF737D8C68D10D917C44ECC0816ECA7A70CFF6C50EC14A419418E4946BB0108A07681A8AC2F7228 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 656 |
Entropy (8bit): | 5.084248903694253 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxxYlXgzlXPnWimI002EtM3MHdNMNxxYlXgzlXPnWimI00OYG6Kq5EtMb:2d6NxRxSZHKd6NxRxSZ7Yhb |
MD5: | B01C83D16D93DCF4CC58D190AAB45BB3 |
SHA1: | 7472205652B35EE44052FD23EC5C329496D515D5 |
SHA-256: | AF1B635295959D24E3048A6043B73E9C591B8A6EA0F7B9CD0C82BBE55D731B67 |
SHA-512: | 58B6C044FA1C54BC371CB6752324626B254EAF4D5A0379ECD27AB5C6EC7BC7C4487AD104F1104DA218BBDFEF6D1ECD3EAD062A8ACC14A79C82BB0DC9FAA2F6B9 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 659 |
Entropy (8bit): | 5.111048257686321 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxcYob+Dzob+WnWimI002EtM3MHdNMNxcYob+Dzob+WnWimI00OYGVEtMb:2d6NxG+DS+WSZHKd6NxG+DS+WSZ7Ykb |
MD5: | 62FB4B45E2A3F029386C247BB8A2BA84 |
SHA1: | 2D90B6B731A8D7F5D08B2E152955B202AC5C13E8 |
SHA-256: | 207C81BAAB28B99E67D162EFCA4D25FEC95D75DED2D73C399E325F3B47E1BF68 |
SHA-512: | E443B7E77A6DA96944AC1235F3FB5D3907163258BBC56C25287EF1E3ACE5A759560FF9638362F5D2A846F00FF0C9CE7FA80F0C5C4FFB4D81F3E75A9F954BF1C7 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 653 |
Entropy (8bit): | 5.100493240268499 |
Encrypted: | false |
SSDEEP: | 12:TMHdNMNxfnYob+Dzob+WnWimI002EtM3MHdNMNxfnYob+Dzob+WnWimI00OYGe5t:2d6NxZ+DS+WSZHKd6NxZ+DS+WSZ7YLjb |
MD5: | 096B29C7136E02A5D60FDB8C68E4FCD8 |
SHA1: | B2E0EECDFC77383B8EBF414EC8EE9505B5D2CFD4 |
SHA-256: | EB5DC9F9660BECE895A734CDE556A1F300193F3C12D88FE59E5E1B67DA85B902 |
SHA-512: | 4280346D4A6C326A34C456CB6ECE4FB6CFD98B6DA6E9F048ECB0C6B152B5FB40CD359A42B4146C42DD067CB9040BFAD04CF6158FBC1DDB1834FA6329D89511EE |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 13061 |
Entropy (8bit): | 0.4896474116676091 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9loT9loT9lW8J+9ndGn:kBqoIUK8odGn |
MD5: | 95F888571CBFF9AB4950C0CE17A96C51 |
SHA1: | C78811B36C3C587978ABCE82849C01B3BA4E035E |
SHA-256: | 1AA2855877AFCDB15C440ED93AA9F6D222BD012EE47DE695D6E1470D588D8408 |
SHA-512: | FAEB37A77D46F91F1A81841D44E493D909C1115DFFF6C8ACD27BA3A4DDE62D199528DE13567C26CAC18B435B4597C488E9D5789E1A9AECEC36A8CE327AD436C4 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 25657 |
Entropy (8bit): | 0.31361137561153196 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw9X9lw9Q69l29jy:kBqoxKAuvScS+yU4 |
MD5: | 8D816B7B983F961ED3B9B509F017ED35 |
SHA1: | 47A27C40157765E957C7E28139AF670C88F3BBDD |
SHA-256: | 50DB79CA883007EF294A69CC8D8E25B3DA50B81AFCD2F48531A3C0A2BF8E601F |
SHA-512: | 614FE9933ADDE0CAFC6891729C2934A9184468E66210CBEEB640E517B3FC92D73E8A607A27B91FB45A8053F6DB7D29E3676163BFA856D2841DA6BD15B137A4A8 |
Malicious: | false |
Preview: |
|
Process: | C:\Program Files\internet explorer\iexplore.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 38753 |
Entropy (8bit): | 0.37411054473392363 |
Encrypted: | false |
SSDEEP: | 24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwR9lwx9l2v9l2v9l/LK:kBqoxKAuvScS+CkuHLILIJnHJndJnu |
MD5: | 7AF44FCAD565F54FD92AD64011D18442 |
SHA1: | 8A1946FA2C4C286A6E25F63308DEF800CBC48041 |
SHA-256: | 563E1D0C449298884934CD1CD244848E193C0FC36A549FE29B8C9E05C922E507 |
SHA-512: | D3587D34852E34A8501B485B7FE5541C842E2F10580ED02573A44303531CC18A16332F3B7FE60CFBAC55288B505B612C7AFAD7D9BDC5B46F5BE9FFE289C4BE7F |
Malicious: | false |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.763543992410411 |
TrID: |
|
File name: | ioir.png.dll |
File size: | 552448 |
MD5: | d31c0491f522d6b9f2102109bd2420af |
SHA1: | dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708 |
SHA256: | f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f |
SHA512: | 48d659660654800da4eb3909a06572dfcf5f05ebdfb8629fafdfeab601673e3377d9a3a241f4bd36c3f4f912ac838dbc73926f734bfa8a76ec43fa726b28c3bd |
SSDEEP: | 12288:XCY7z0vLfhyqJ0UYek/zLOmyK8rkApSc1jJFX:SWz09yqJ5Ye6PHuNScBJF |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
File Icon |
---|
Icon Hash: | b99988fcd4f66e0f |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x46980c |
Entrypoint Section: | CODE |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 127ef7eee4def6f47e8e66d53f8ddc7c |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFC4h |
mov eax, 0046960Ch |
call 00007FBA84DDB765h |
xor ecx, ecx |
mov dl, 01h |
mov eax, dword ptr [00468FFCh] |
call 00007FBA84E10F9Bh |
mov dword ptr [0046CC30h], eax |
mov eax, dword ptr [0046CC30h] |
call 00007FBA84E152E4h |
call 00007FBA84DD97E3h |
mov eax, eax |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x6d000 | 0x23e4 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x78000 | 0x13000 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x70000 | 0x7610 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x68840 | 0x68a00 | False | 0.523362828554 | data | 6.51070065198 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
DATA | 0x6a000 | 0x12d4 | 0x1400 | False | 0.433984375 | data | 4.02181905914 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
BSS | 0x6c000 | 0xc35 | 0x0 | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.idata | 0x6d000 | 0x23e4 | 0x2400 | False | 0.369357638889 | data | 5.03762629251 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.reloc | 0x70000 | 0x7610 | 0x7800 | False | 0.58466796875 | data | 6.61973320617 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x78000 | 0x13000 | 0x13000 | False | 0.732010690789 | data | 7.14558558427 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Resources |
---|
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
F1 | 0x78b68 | 0xd204 | data | English | United States |
RT_CURSOR | 0x85d6c | 0x134 | data | ||
RT_CURSOR | 0x85ea0 | 0x134 | data | ||
RT_CURSOR | 0x85fd4 | 0x134 | data | ||
RT_CURSOR | 0x86108 | 0x134 | data | ||
RT_CURSOR | 0x8623c | 0x134 | data | ||
RT_CURSOR | 0x86370 | 0x134 | data | ||
RT_CURSOR | 0x864a4 | 0x134 | data | ||
RT_BITMAP | 0x865d8 | 0x1d0 | data | ||
RT_BITMAP | 0x867a8 | 0x1e4 | data | ||
RT_BITMAP | 0x8698c | 0x1d0 | data | ||
RT_BITMAP | 0x86b5c | 0x1d0 | data | ||
RT_BITMAP | 0x86d2c | 0x1d0 | data | ||
RT_BITMAP | 0x86efc | 0x1d0 | data | ||
RT_BITMAP | 0x870cc | 0x1d0 | data | ||
RT_BITMAP | 0x8729c | 0x1d0 | data | ||
RT_BITMAP | 0x8746c | 0x1d0 | data | ||
RT_BITMAP | 0x8763c | 0x1d0 | data | ||
RT_BITMAP | 0x8780c | 0xe8 | GLS_BINARY_LSB_FIRST | ||
RT_ICON | 0x878f4 | 0x2e8 | dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 49, next used block 48059 | Russian | Russia |
RT_DIALOG | 0x87bdc | 0x52 | data | ||
RT_STRING | 0x87c30 | 0x224 | data | ||
RT_STRING | 0x87e54 | 0x1ec | data | ||
RT_STRING | 0x88040 | 0xec | data | ||
RT_STRING | 0x8812c | 0x39c | data | ||
RT_STRING | 0x884c8 | 0xec | Hitachi SH big-endian COFF object file, not stripped, 17664 sections, symbol offset=0x65007200, 83907328 symbols, optional header size 28672 | ||
RT_STRING | 0x885b4 | 0xf8 | data | ||
RT_STRING | 0x886ac | 0x1a8 | data | ||
RT_STRING | 0x88854 | 0x398 | data | ||
RT_STRING | 0x88bec | 0x3e0 | data | ||
RT_STRING | 0x88fcc | 0x3a8 | data | ||
RT_STRING | 0x89374 | 0x418 | data | ||
RT_STRING | 0x8978c | 0x234 | data | ||
RT_STRING | 0x899c0 | 0xec | data | ||
RT_STRING | 0x89aac | 0x1b4 | data | ||
RT_STRING | 0x89c60 | 0x3e4 | data | ||
RT_STRING | 0x8a044 | 0x358 | data | ||
RT_STRING | 0x8a39c | 0x2b4 | data | ||
RT_RCDATA | 0x8a650 | 0x10 | data | ||
RT_RCDATA | 0x8a660 | 0x288 | data | ||
RT_RCDATA | 0x8a8e8 | 0x443 | Delphi compiled form 'TForm1' | ||
RT_RCDATA | 0x8ad2c | 0xed | Delphi compiled form 'TForm2' | ||
RT_GROUP_CURSOR | 0x8ae1c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae30 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae44 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae58 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae6c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae80 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_CURSOR | 0x8ae94 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | ||
RT_GROUP_ICON | 0x8aea8 | 0x14 | data | Russian | Russia |
Imports |
---|
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
kernel32.dll | lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create |
winspool.drv | OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter |
kernel32.dll | MulDiv |
Possible Origin |
---|
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States | |
Russian | Russia |
Network Behavior |
---|
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 5, 2021 15:11:09.010075092 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.010190010 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.075484037 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.075531006 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.075582981 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.075659990 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.082328081 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.083014965 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.147501945 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.147896051 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.150233984 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.150275946 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.150302887 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.150317907 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.150355101 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.150366068 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.152689934 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.152740002 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.152777910 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.152812004 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.152846098 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.152849913 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.181955099 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.182029009 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.247997999 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.248059034 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:11:09.248152971 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.248842955 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.248872042 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.248944998 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:11:09.314248085 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:12:09.146543026 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:12:09.146572113 CET | 443 | 49744 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:12:09.146727085 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:12:09.146775007 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:09.593648911 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:09.593756914 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:09.880130053 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:09.880187988 CET | 49744 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:09.880901098 CET | 49745 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:09.991070032 CET | 443 | 49745 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:21.885030985 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:21.954657078 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:21.955271959 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:21.959441900 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.024964094 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:22.027736902 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:22.027772903 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:22.027786970 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:22.027903080 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.044152975 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.109941959 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
Feb 5, 2021 15:13:22.110074997 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.111372948 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.111480951 CET | 49777 | 443 | 192.168.2.4 | 45.133.216.103 |
Feb 5, 2021 15:13:22.176907063 CET | 443 | 49777 | 45.133.216.103 | 192.168.2.4 |
UDP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Feb 5, 2021 15:10:57.127938032 CET | 63153 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:10:57.177488089 CET | 53 | 63153 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:10:58.288995981 CET | 52991 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:10:58.335963964 CET | 53 | 52991 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:10:59.215821028 CET | 53700 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:10:59.265412092 CET | 53 | 53700 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:00.274355888 CET | 51726 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:00.330168009 CET | 53 | 51726 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:02.153189898 CET | 56794 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:02.200150013 CET | 53 | 56794 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:03.184634924 CET | 56534 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:03.242126942 CET | 53 | 56534 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:04.454282999 CET | 56627 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:04.500952005 CET | 53 | 56627 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:05.451766014 CET | 56621 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:05.498395920 CET | 53 | 56621 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:07.445197105 CET | 63116 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:07.492767096 CET | 53 | 63116 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:07.784857988 CET | 64078 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:07.845151901 CET | 53 | 64078 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:08.941991091 CET | 64801 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:08.999475002 CET | 53 | 64801 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:09.272541046 CET | 61721 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:09.321039915 CET | 53 | 61721 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:10.246723890 CET | 51255 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:10.293646097 CET | 53 | 51255 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:11.079930067 CET | 61522 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:11.127470970 CET | 53 | 61522 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:11.267817020 CET | 52337 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:11.314388037 CET | 53 | 52337 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:12.454510927 CET | 55046 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:12.505116940 CET | 53 | 55046 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:13.434499979 CET | 49612 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:13.481628895 CET | 53 | 49612 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:14.607250929 CET | 49285 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:14.656871080 CET | 53 | 49285 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:21.144412041 CET | 50601 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:21.196465015 CET | 53 | 50601 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:25.537904978 CET | 60875 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:25.596429110 CET | 53 | 60875 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:37.780924082 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:37.830451965 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:38.495282888 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:38.543936014 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:38.787137032 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:38.840082884 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:39.506083012 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:39.554653883 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:39.807240009 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:39.867321968 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:40.026734114 CET | 62420 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:40.081789970 CET | 53 | 62420 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:40.521188021 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:40.570120096 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:40.660974026 CET | 60579 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:40.715950012 CET | 53 | 60579 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:40.862476110 CET | 50183 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:40.931441069 CET | 53 | 50183 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:41.526072025 CET | 61531 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:41.575651884 CET | 53 | 61531 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:41.802392960 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:41.851960897 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:42.033946991 CET | 49228 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:42.083383083 CET | 53 | 49228 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:42.521174908 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:42.567806959 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:42.717406988 CET | 59794 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:42.772543907 CET | 53 | 59794 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:43.363240004 CET | 55916 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:43.418147087 CET | 53 | 55916 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:44.343419075 CET | 52752 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:44.398530960 CET | 53 | 52752 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:45.485378027 CET | 60542 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:45.540724993 CET | 53 | 60542 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:45.818109035 CET | 56448 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:45.867546082 CET | 53 | 56448 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:46.537005901 CET | 59172 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:46.577455997 CET | 60689 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:46.583584070 CET | 53 | 59172 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:46.625001907 CET | 53 | 60689 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:47.379790068 CET | 64206 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:47.437128067 CET | 53 | 64206 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:56.759221077 CET | 50904 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:56.808696985 CET | 53 | 50904 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:57.357604027 CET | 57525 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:11:57.406884909 CET | 53 | 57525 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:11:59.997220993 CET | 53814 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:12:00.055185080 CET | 53 | 53814 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:12:31.420690060 CET | 53418 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:12:31.467262983 CET | 53 | 53418 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:12:33.305716038 CET | 62833 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:12:33.354562998 CET | 53 | 62833 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:21.816430092 CET | 59260 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:21.874515057 CET | 53 | 59260 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:51.537769079 CET | 49944 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:51.597984076 CET | 53 | 49944 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:52.531815052 CET | 49944 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:52.583115101 CET | 53 | 49944 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:53.532160997 CET | 49944 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:53.582953930 CET | 53 | 49944 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:55.547427893 CET | 49944 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:55.607625961 CET | 53 | 49944 | 8.8.8.8 | 192.168.2.4 |
Feb 5, 2021 15:13:59.563509941 CET | 49944 | 53 | 192.168.2.4 | 8.8.8.8 |
Feb 5, 2021 15:13:59.612879992 CET | 53 | 49944 | 8.8.8.8 | 192.168.2.4 |
DNS Queries |
---|
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class |
---|---|---|---|---|---|---|---|
Feb 5, 2021 15:11:08.941991091 CET | 192.168.2.4 | 8.8.8.8 | 0xd178 | Standard query (0) | A (IP address) | IN (0x0001) | |
Feb 5, 2021 15:13:21.816430092 CET | 192.168.2.4 | 8.8.8.8 | 0xf9eb | Standard query (0) | A (IP address) | IN (0x0001) |
DNS Answers |
---|
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class |
---|---|---|---|---|---|---|---|---|---|
Feb 5, 2021 15:11:08.999475002 CET | 8.8.8.8 | 192.168.2.4 | 0xd178 | No error (0) | 45.133.216.103 | A (IP address) | IN (0x0001) | ||
Feb 5, 2021 15:13:21.874515057 CET | 8.8.8.8 | 192.168.2.4 | 0xf9eb | No error (0) | 45.133.216.103 | A (IP address) | IN (0x0001) |
HTTPS Packets |
---|
Timestamp | Source IP | Source Port | Dest IP | Dest Port | Subject | Issuer | Not Before | Not After | JA3 SSL Client Fingerprint | JA3 SSL Client Digest |
---|---|---|---|---|---|---|---|---|---|---|
Feb 5, 2021 15:11:09.150275946 CET | 45.133.216.103 | 443 | 192.168.2.4 | 49744 | CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,0 | 9e10692f1b7f78228b2d4e424db3a98c |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 | |||||||
Feb 5, 2021 15:11:09.152740002 CET | 45.133.216.103 | 443 | 192.168.2.4 | 49745 | CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,0 | 9e10692f1b7f78228b2d4e424db3a98c |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 | |||||||
Feb 5, 2021 15:13:22.027772903 CET | 45.133.216.103 | 443 | 192.168.2.4 | 49777 | CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=US | CN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co. | Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020 | Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021 | 771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,0 | 9e10692f1b7f78228b2d4e424db3a98c |
CN=R3, O=Let's Encrypt, C=US | CN=DST Root CA X3, O=Digital Signature Trust Co. | Wed Oct 07 21:21:40 CEST 2020 | Wed Sep 29 21:21:40 CEST 2021 |
Code Manipulations |
---|
Statistics |
---|
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 15:11:01 |
Start date: | 05/02/2021 |
Path: | C:\Windows\System32\loaddll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x90000 |
File size: | 121856 bytes |
MD5 hash: | 99D621E00EFC0B8F396F38D5555EB078 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | moderate |
General |
---|
Start time: | 15:11:01 |
Start date: | 05/02/2021 |
Path: | C:\Windows\SysWOW64\rundll32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xde0000 |
File size: | 61952 bytes |
MD5 hash: | D7CA562B0DB4F4DD0F03A89A1FDAD63D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | high |
General |
---|
Start time: | 15:11:03 |
Start date: | 05/02/2021 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x11a0000 |
File size: | 434592 bytes |
MD5 hash: | 9E2B8ACAD48ECCA55C0230D63623661B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 15:11:06 |
Start date: | 05/02/2021 |
Path: | C:\Program Files\internet explorer\iexplore.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7f1c20000 |
File size: | 823560 bytes |
MD5 hash: | 6465CB92B25A7BC1DF8E01D8AC5E7596 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 15:11:07 |
Start date: | 05/02/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x10e0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
General |
---|
Start time: | 15:13:20 |
Start date: | 05/02/2021 |
Path: | C:\Program Files (x86)\Internet Explorer\iexplore.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x10e0000 |
File size: | 822536 bytes |
MD5 hash: | 071277CC2E3DF41EEEA8013E2AB58D5A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Disassembly |
---|
Code Analysis |
---|