Windows
Analysis Report
CheatInjector.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- CheatInjector.exe (PID: 2996 cmdline:
"C:\Users\ user\Deskt op\CheatIn jector.exe " MD5: 9FB7DA682B76ACBDF560398AA193FF7A) - CheatInjector.exe (PID: 2892 cmdline:
"C:\Users\ user\Deskt op\CheatIn jector.exe " MD5: 9FB7DA682B76ACBDF560398AA193FF7A) - WerFault.exe (PID: 736 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 2 996 -s 280 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["necklacedmny.store", "fadehairucw.store", "scriptyprefej.store", "founpiuer.store", "thumbystriw.store", "navygenerayk.store", "crisiwarny.store", "presticitpo.store", "prinyveri.cfd"], "Build id": "LPnhqo--qgfvqmqriubx"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T07:01:09.388235+0200 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:10.712187+0200 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:23.128913+0200 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49746 | 104.21.95.91 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T07:01:09.388235+0200 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 104.21.95.91 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T07:01:10.712187+0200 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49732 | 104.21.95.91 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T07:01:14.734353+0200 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49738 | 104.21.95.91 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004DB239 |
Source: | Code function: | 0_2_00520059 | |
Source: | Code function: | 0_2_00510178 | |
Source: | Code function: | 0_2_004F4190 | |
Source: | Code function: | 0_2_00530250 | |
Source: | Code function: | 0_2_004FC230 | |
Source: | Code function: | 0_2_00532366 | |
Source: | Code function: | 0_2_00532366 | |
Source: | Code function: | 0_2_004F4440 | |
Source: | Code function: | 0_2_0051E435 | |
Source: | Code function: | 0_2_0051E4CB | |
Source: | Code function: | 0_2_0051E4FB | |
Source: | Code function: | 0_2_005184BB | |
Source: | Code function: | 0_2_00530555 | |
Source: | Code function: | 0_2_00530555 | |
Source: | Code function: | 0_2_0051051C | |
Source: | Code function: | 0_2_0051E50B | |
Source: | Code function: | 0_2_00516690 | |
Source: | Code function: | 0_2_0050E780 | |
Source: | Code function: | 0_2_0050E780 | |
Source: | Code function: | 0_2_0051E895 | |
Source: | Code function: | 0_2_00518990 | |
Source: | Code function: | 0_2_0051AABE | |
Source: | Code function: | 0_2_0051AB1E | |
Source: | Code function: | 0_2_0051EC6D | |
Source: | Code function: | 0_2_0051EC6D | |
Source: | Code function: | 0_2_004FCC3F | |
Source: | Code function: | 0_2_00510D50 | |
Source: | Code function: | 0_2_00532D70 | |
Source: | Code function: | 0_2_00526DA0 | |
Source: | Code function: | 0_2_0051AE2E | |
Source: | Code function: | 0_2_0051CEE0 | |
Source: | Code function: | 0_2_0052CFE0 | |
Source: | Code function: | 0_2_004F30C0 | |
Source: | Code function: | 0_2_00533240 | |
Source: | Code function: | 0_2_00515280 | |
Source: | Code function: | 0_2_00533350 | |
Source: | Code function: | 0_2_0052D370 | |
Source: | Code function: | 0_2_004FD3E0 | |
Source: | Code function: | 0_2_0050D45F | |
Source: | Code function: | 0_2_0051D470 | |
Source: | Code function: | 0_2_0050D437 | |
Source: | Code function: | 0_2_004EF430 | |
Source: | Code function: | 0_2_004EF430 | |
Source: | Code function: | 0_2_005194D0 | |
Source: | Code function: | 0_2_0052D4C0 | |
Source: | Code function: | 0_2_0052D4C0 | |
Source: | Code function: | 0_2_0052D4C0 | |
Source: | Code function: | 0_2_0052D4C0 | |
Source: | Code function: | 0_2_005335E0 | |
Source: | Code function: | 0_2_004F5650 | |
Source: | Code function: | 0_2_0052F6BD | |
Source: | Code function: | 0_2_0051B75D | |
Source: | Code function: | 0_2_0051B75D | |
Source: | Code function: | 0_2_004EF705 | |
Source: | Code function: | 0_2_00519850 | |
Source: | Code function: | 0_2_0051F821 | |
Source: | Code function: | 0_2_0051F821 | |
Source: | Code function: | 0_2_0050B826 | |
Source: | Code function: | 0_2_005338C0 | |
Source: | Code function: | 0_2_005338C0 | |
Source: | Code function: | 0_2_004FD9BD | |
Source: | Code function: | 0_2_00533BA0 | |
Source: | Code function: | 0_2_00533BA0 | |
Source: | Code function: | 0_2_0050DBAD | |
Source: | Code function: | 0_2_0050BC6A | |
Source: | Code function: | 0_2_0051DD30 | |
Source: | Code function: | 0_2_004FDDD8 | |
Source: | Code function: | 0_2_00513E33 | |
Source: | Code function: | 0_2_004FBEA0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0050A05C | |
Source: | Code function: | 0_2_00512070 | |
Source: | Code function: | 0_2_005221C0 | |
Source: | Code function: | 0_2_004F8181 | |
Source: | Code function: | 0_2_004FC230 | |
Source: | Code function: | 0_2_004F63F0 | |
Source: | Code function: | 0_2_004D0470 | |
Source: | Code function: | 0_2_0051E435 | |
Source: | Code function: | 0_2_0051E4CB | |
Source: | Code function: | 0_2_005184BB | |
Source: | Code function: | 0_2_00530555 | |
Source: | Code function: | 0_2_0051E50B | |
Source: | Code function: | 0_2_005066E7 | |
Source: | Code function: | 0_2_004FA700 | |
Source: | Code function: | 0_2_0051A732 | |
Source: | Code function: | 0_2_004FC730 | |
Source: | Code function: | 0_2_0050E780 | |
Source: | Code function: | 0_2_004CE821 | |
Source: | Code function: | 0_2_004D8823 | |
Source: | Code function: | 0_2_0050C995 | |
Source: | Code function: | 0_2_00520B45 | |
Source: | Code function: | 0_2_004CEB69 | |
Source: | Code function: | 0_2_004F8B30 | |
Source: | Code function: | 0_2_0051EC6D | |
Source: | Code function: | 0_2_004C4C86 | |
Source: | Code function: | 0_2_00510D50 | |
Source: | Code function: | 0_2_0050CDF2 | |
Source: | Code function: | 0_2_004D4E13 | |
Source: | Code function: | 0_2_00530F30 | |
Source: | Code function: | 0_2_004FF0B5 | |
Source: | Code function: | 0_2_004DF175 | |
Source: | Code function: | 0_2_004C710C | |
Source: | Code function: | 0_2_004F9100 | |
Source: | Code function: | 0_2_0051F1C8 | |
Source: | Code function: | 0_2_00529200 | |
Source: | Code function: | 0_2_00533350 | |
Source: | Code function: | 0_2_0050335D | |
Source: | Code function: | 0_2_004FD3E0 | |
Source: | Code function: | 0_2_0050544A | |
Source: | Code function: | 0_2_0051D470 | |
Source: | Code function: | 0_2_00529460 | |
Source: | Code function: | 0_2_00531410 | |
Source: | Code function: | 0_2_0051F417 | |
Source: | Code function: | 0_2_0051B420 | |
Source: | Code function: | 0_2_004EF430 | |
Source: | Code function: | 0_2_005194D0 | |
Source: | Code function: | 0_2_0052D4C0 | |
Source: | Code function: | 0_2_005154E0 | |
Source: | Code function: | 0_2_005335E0 | |
Source: | Code function: | 0_2_00511690 | |
Source: | Code function: | 0_2_005136A0 | |
Source: | Code function: | 0_2_004EF758 | |
Source: | Code function: | 0_2_004F9760 | |
Source: | Code function: | 0_2_004EF705 | |
Source: | Code function: | 0_2_004FF83D | |
Source: | Code function: | 0_2_005338C0 | |
Source: | Code function: | 0_2_004F38D0 | |
Source: | Code function: | 0_2_00523890 | |
Source: | Code function: | 0_2_004F3969 | |
Source: | Code function: | 0_2_004F59D0 | |
Source: | Code function: | 0_2_00511A00 | |
Source: | Code function: | 0_2_00523AF0 | |
Source: | Code function: | 0_2_00529B40 | |
Source: | Code function: | 0_2_004F9BF0 | |
Source: | Code function: | 0_2_00533BA0 | |
Source: | Code function: | 0_2_0050FCA6 | |
Source: | Code function: | 0_2_00521D70 | |
Source: | Code function: | 0_2_004F1D10 | |
Source: | Code function: | 0_2_00503FE7 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | File created: | Jump to behavior |
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Command line argument: | 0_2_004C59D6 | |
Source: | Command line argument: | 0_2_004C59D6 | |
Source: | Command line argument: | 0_2_004C59D6 | |
Source: | Command line argument: | 0_2_004C59D6 | |
Source: | Command line argument: | 0_2_004E35C0 |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00526315 | |
Source: | Code function: | 0_2_004C6B6D | |
Source: | Code function: | 0_2_004C517C | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C318D2 | |
Source: | Code function: | 1_3_03C318D2 | |
Source: | Code function: | 1_3_03C318D2 | |
Source: | Code function: | 1_3_03C30559 | |
Source: | Code function: | 1_3_03C30559 | |
Source: | Code function: | 1_3_03C30559 | |
Source: | Code function: | 1_3_03C30781 | |
Source: | Code function: | 1_3_03C30781 | |
Source: | Code function: | 1_3_03C30781 | |
Source: | Code function: | 1_3_03C30541 | |
Source: | Code function: | 1_3_03C30541 | |
Source: | Code function: | 1_3_03C30541 | |
Source: | Code function: | 1_3_01643089 | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C30600 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C306A9 | |
Source: | Code function: | 1_3_03C318D2 | |
Source: | Code function: | 1_3_03C318D2 | |
Source: | Code function: | 1_3_03C318D2 |
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_004DB239 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 0_2_004C511C |
Source: | Code function: | 0_2_004CB4F3 |
Source: | Code function: | 0_2_004C59D6 | |
Source: | Code function: | 0_2_004D951A | |
Source: | Code function: | 0_2_004D18CF |
Source: | Code function: | 0_2_004C59D6 |
Source: | Code function: | 0_2_004C7479 | |
Source: | Code function: | 0_2_004CB4F3 | |
Source: | Code function: | 0_2_004C777F | |
Source: | Code function: | 0_2_004C790C |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_004DE1A7 | |
Source: | Code function: | 0_2_004DE2D0 | |
Source: | Code function: | 0_2_004DE3D6 | |
Source: | Code function: | 0_2_004DE4A5 | |
Source: | Code function: | 0_2_004D54FD | |
Source: | Code function: | 0_2_004D59C6 | |
Source: | Code function: | 0_2_004DDDE3 | |
Source: | Code function: | 0_2_004DDE2E | |
Source: | Code function: | 0_2_004DDEC9 | |
Source: | Code function: | 0_2_004DDF54 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_004C7679 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 111 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 12 Virtualization/Sandbox Evasion | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 111 Process Injection | Security Account Manager | 151 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 11 Deobfuscate/Decode Files or Information | NTDS | 12 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 3 Obfuscated Files or Information | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Software Packing | Cached Domain Credentials | 11 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 1 DLL Side-Loading | DCSync | 33 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
47% | ReversingLabs | Win32.Infostealer.Tinba | ||
58% | Virustotal | Browse | ||
100% | Avira | HEUR/AGEN.1311191 | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
1% | Virustotal | Browse | ||
1% | Virustotal | Browse | ||
17% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | URL Reputation | safe | ||
0% | Virustotal | Browse |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
crisiwarny.store | 104.21.95.91 | true | true |
| unknown |
prinyveri.cfd | unknown | unknown | true |
| unknown |
presticitpo.store | unknown | unknown | true |
| unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false | unknown | |||
false |
| unknown | ||
false |
| unknown | ||
false | unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.95.91 | crisiwarny.store | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1542679 |
Start date and time: | 2024-10-26 07:00:06 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 57s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | CheatInjector.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@4/6@3/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 104.208.16.94
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
- Execution Graph export aborted for target CheatInjector.exe, PID 2892 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
01:01:07 | API Interceptor | |
01:01:24 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.95.91 | Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
crisiwarny.store | Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | AgentTesla | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CheatInjector.ex_32976456f53d9ed7895573c0f1b9b852cfa91eea_d88013b7_19b5572d-dc75-4c90-9317-befffdb2e13c\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.71526939389273 |
Encrypted: | false |
SSDEEP: | 192:zK0oVj0DlqX0BU/atzju1zuiFmZ24IO8cd:zPOOlnBU/gjczuiFmY4IO8E |
MD5: | AC2361E165B95075367E2C12879DA251 |
SHA1: | FE008967F9C7EC6379FC85BF97C7A2D9B21C90AB |
SHA-256: | F06F8BCB138FB62C43D7288E1A55A60829A1C9D9DBCB8F0291EF04A0FD23A558 |
SHA-512: | 9CAD82341FC49EBBC2C429C061FC41C6831FF29D6413F8428AE171186583DB7455585F2DB65CF387B631079BD0B9F7347E0E6847713B71AF7210CFB5A08A0857 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 37142 |
Entropy (8bit): | 1.6842168506471353 |
Encrypted: | false |
SSDEEP: | 96:5c86oT6saCTkLre3kS5X17Yhi73CSSmt6Ais2A1B4OoU+5uWIkWIyUIExwROPJg:h6zwuZhOn3F1AxyOP |
MD5: | 0D55C4B8CFCEC18F1A16C5F2570E661A |
SHA1: | 3DC685EAEE982DA00A886A29AA02FC18F586A526 |
SHA-256: | 3E3FCA690D2186518C652C8868C71904B5E66C7E57C8A56600D1FF3F6245F0A9 |
SHA-512: | 33B27D104C91F3482F0109F882DFD864438522A7909B3A1CA02164F8AAEADD8E14C23AC6E04E7A25D26734F45B94A063DC778AA6B83AE2265126A5BD2380D42C |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8430 |
Entropy (8bit): | 3.69546068642165 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJN+f6oIe6Y9XSU9X7gmff7SHprt89babVsfUUjm:R6lXJ06W6Y9SU9X7gmfzSQabufv6 |
MD5: | 3B48F45EA8E987B647888F41350E66A3 |
SHA1: | 1751F641B5BFA07592B33D0C2453BA846F297516 |
SHA-256: | FFDEF58C1E714F37C4E3B1D337BB44BF6B2064102B27F6E3903FF1ECF4D90A66 |
SHA-512: | 7C0F646716C6172AA8BD5DF1CF1C3C660E4F9930628E450C62EE930A6929B33C28EE7056BF10E0D77C1766FAF2DB11FA853E8707BB1253465664D4AE45C5C704 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4815 |
Entropy (8bit): | 4.492920740268877 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsBJg77aI9EPWpW8VYsYm8M4JNHFO+q8vZZQDU1d:uIjfTI7Ce7VcJqK7QDU1d |
MD5: | 22E584FA07092DFEABFC44333D8E8390 |
SHA1: | 23E68929056BC586415E18CE159286631D2CD4CA |
SHA-256: | 4DDE78723FA5DA062453909BB495A9AD79A9FDA54C0FB347B2002AC7F03EE4B7 |
SHA-512: | FBEDE7D94D68025F0CB9EE3ED7D2153CF305F72F1043CDD04F4EA5841E5169EF438AE55191AB58179C0F3337EBA0A90626DC46F3C9DB7EABF707A0EC0DA1A93F |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\CheatInjector.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 400 |
Entropy (8bit): | 1.0 |
Encrypted: | false |
SSDEEP: | 3:rj:X |
MD5: | 8BD30F5E64692F2971D94D201A7BDDBC |
SHA1: | 1445B76763A443E3660BF686365374B5AA0407EA |
SHA-256: | EF938B9C248649B6EB4C1532F87EF94A8179E15D56EB8BA68EF92BCE2E68B7C1 |
SHA-512: | 37B0A14A1A21FD74BAD140477BE394816CD11D6778DE1007963B1EB9B81C0E246E1D779B40D3D863A6CB150AA4D5904D7492F607A8BE054B2D0281A78319CE56 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.4659926583078775 |
Encrypted: | false |
SSDEEP: | 6144:JIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uN1dwBCswSbv:6XD94+WlLZMM6YFH3+v |
MD5: | B5B5A84E684B461D998156ED8AB4C166 |
SHA1: | 761B2688477DD57EDEEA599AA8E5D951A5AB9834 |
SHA-256: | 3ECE0A608E6508E7D8DE5C7DBE6181AAF5A13658CCCD81C73A4B7D5FC0A3E824 |
SHA-512: | AA568FD2AB119B56F3CF7992D4038E8433222DF5F4A74F49C5FE647F49CCEC4E51DDA5F64D33C017A3C9BA7DBED9B86B89C005AB233EF5E5F03C17638884118A |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.69074748041136 |
TrID: |
|
File name: | CheatInjector.exe |
File size: | 539'648 bytes |
MD5: | 9fb7da682b76acbdf560398aa193ff7a |
SHA1: | 200ec14a4c59576f288b3f86021d0d4b7c16bcf5 |
SHA256: | a37043d7bbd6e5f0f5e9caddc36de161c5287041cc46b09891f0ce65064de870 |
SHA512: | 40d2ad44e02e8fd0ae874f01130e72f22bd687f69198d84bea2328e64b2b34cf04fe6571c4dceff088a6367e9d52c4f4e6c776c99c24fab97f1ad7d3abdd5db0 |
SSDEEP: | 12288:23jd2h8A5Fa/5aZrpYyKqfxPpFUbHHSq96VNXKJPZci5:2EhSxure0x6ymWUMi5 |
TLSH: | A9B4F111B1C0C073D57319320AF4E7B56F3EBD350EA16A9F67941BBE5F30280E625A6A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.ni...:...:...:...;...:...;...:...;...:...;...:...;...:...;...:...:u..:...;^..:C..;...:C..:...:C..;...:Rich...:........PE..L.. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x406e80 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x671BBDAC [Fri Oct 25 15:47:56 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 15c1a3252578de27fcd7c556fbfdb6ef |
Instruction |
---|
call 00007FE1ED346106h |
jmp 00007FE1ED34573Fh |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
push esi |
mov ecx, dword ptr [eax+3Ch] |
add ecx, eax |
movzx eax, word ptr [ecx+14h] |
lea edx, dword ptr [ecx+18h] |
add edx, eax |
movzx eax, word ptr [ecx+06h] |
imul esi, eax, 28h |
add esi, edx |
cmp edx, esi |
je 00007FE1ED3458DBh |
mov ecx, dword ptr [ebp+0Ch] |
cmp ecx, dword ptr [edx+0Ch] |
jc 00007FE1ED3458CCh |
mov eax, dword ptr [edx+08h] |
add eax, dword ptr [edx+0Ch] |
cmp ecx, eax |
jc 00007FE1ED3458CEh |
add edx, 28h |
cmp edx, esi |
jne 00007FE1ED3458ACh |
xor eax, eax |
pop esi |
pop ebp |
ret |
mov eax, edx |
jmp 00007FE1ED3458BBh |
push esi |
call 00007FE1ED346406h |
test eax, eax |
je 00007FE1ED3458E2h |
mov eax, dword ptr fs:[00000018h] |
mov esi, 00483668h |
mov edx, dword ptr [eax+04h] |
jmp 00007FE1ED3458C6h |
cmp edx, eax |
je 00007FE1ED3458D2h |
xor eax, eax |
mov ecx, edx |
lock cmpxchg dword ptr [esi], ecx |
test eax, eax |
jne 00007FE1ED3458B2h |
xor al, al |
pop esi |
ret |
mov al, 01h |
pop esi |
ret |
push ebp |
mov ebp, esp |
cmp dword ptr [ebp+08h], 00000000h |
jne 00007FE1ED3458C9h |
mov byte ptr [0048366Ch], 00000001h |
call 00007FE1ED345ABCh |
call 00007FE1ED3489A9h |
test al, al |
jne 00007FE1ED3458C6h |
xor al, al |
pop ebp |
ret |
call 00007FE1ED352068h |
test al, al |
jne 00007FE1ED3458CCh |
push 00000000h |
call 00007FE1ED3489B0h |
pop ecx |
jmp 00007FE1ED3458ABh |
mov al, 01h |
pop ebp |
ret |
push ebp |
mov ebp, esp |
cmp byte ptr [0048366Dh], 00000000h |
je 00007FE1ED3458C6h |
mov al, 01h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2dbcc | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x85000 | 0x595 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x1bdc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2beb8 | 0x1c | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2bdf8 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x24000 | 0x148 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x22f2e | 0x23000 | 6806fb945c9631245e7fdacd2a890e45 | False | 0.5811593191964286 | data | 6.64543086149956 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x24000 | 0xa328 | 0xa400 | e5b67c1f458916c2765ddcf8a9e5fa65 | False | 0.4328791920731707 | OpenPGP Public Key | 4.943867183484972 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x2f000 | 0x55178 | 0x54200 | 4961ddc44c8db4432c6c197f05b78540 | False | 0.9910992059806835 | DOS executable (COM) | 7.992517442948515 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x85000 | 0x595 | 0x600 | 45e64a7f6ae1f88bd3582c477816961b | False | 0.4420572916666667 | data | 3.9821233375152167 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x86000 | 0x1bdc | 0x1c00 | 8335ec102bfed00989b5ce26588b6d9a | False | 0.7571149553571429 | data | 6.516926500875983 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x850a0 | 0x378 | data | English | United States | 0.46283783783783783 |
RT_MANIFEST | 0x85418 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
USER32.dll | wsprintfA |
KERNEL32.dll | TerminateProcess, WriteConsoleW, GetStdHandle, DeleteFileA, HeapAlloc, HeapFree, GetProcessHeap, GlobalFindAtomW, WriteConsoleA, CloseHandle, WaitForSingleObjectEx, GetCurrentThreadId, GetExitCodeThread, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceCounter, EncodePointer, DecodePointer, MultiByteToWideChar, LCMapStringEx, GetSystemTimeAsFileTime, GetModuleHandleW, GetProcAddress, GetStringTypeW, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, SetEndOfFile, GetCurrentProcessId, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, HeapSize, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetModuleHandleExW, WriteFile, GetModuleFileNameW, ExitProcess, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, CreateFileW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-10-26T07:01:09.388235+0200 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:09.388235+0200 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:10.712187+0200 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49732 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:10.712187+0200 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49732 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:14.734353+0200 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49738 | 104.21.95.91 | 443 | TCP |
2024-10-26T07:01:23.128913+0200 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49746 | 104.21.95.91 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 26, 2024 07:01:07.565939903 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:07.565988064 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:07.566063881 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:07.568555117 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:07.568572998 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:08.201050997 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:08.201127052 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:08.221256018 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:08.221297026 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:08.222237110 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:08.267378092 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:08.782516003 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:08.782563925 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:08.782854080 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.388289928 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.388590097 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.388699055 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.390044928 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.390095949 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.390126944 CEST | 49730 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.390145063 CEST | 443 | 49730 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.452006102 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.452122927 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:09.452214956 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.452495098 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:09.452528954 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.295140028 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.295289040 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.297065020 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.297077894 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.297601938 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.299010992 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.299035072 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.299091101 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712179899 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712416887 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712500095 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.712510109 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712578058 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712645054 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.712663889 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712763071 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.712897062 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.712910891 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.714093924 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.714157104 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.714170933 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.767302990 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.767335892 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.814178944 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.827410936 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.827742100 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.827800035 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.827819109 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.828051090 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.828114033 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.828217030 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.828268051 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.828299046 CEST | 49732 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.828315020 CEST | 443 | 49732 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.980027914 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.980115891 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:10.980211020 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.980534077 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:10.980568886 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:12.134910107 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:12.135001898 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:12.136595964 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:12.136625051 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:12.137547970 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:12.152946949 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:12.153086901 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:12.153215885 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:12.153292894 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:12.153318882 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:13.126399040 CEST | 443 | 49734 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:13.126817942 CEST | 49734 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:13.238045931 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:13.238126040 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:13.238214970 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:13.238506079 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:13.238531113 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.135915995 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.136178017 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.152905941 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.152983904 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.153845072 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.204817057 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.269170046 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.269315004 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.269411087 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.734380007 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.734638929 CEST | 443 | 49738 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.734698057 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.734699011 CEST | 49738 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.964379072 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.964446068 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:14.964557886 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.964833021 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:14.964864969 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:15.822877884 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:15.822981119 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:15.824074984 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:15.824101925 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:15.824599981 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:15.831916094 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:15.832046986 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:15.832160950 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:15.832247972 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:15.832266092 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:16.456449986 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:16.456799030 CEST | 443 | 49740 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:16.456795931 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:16.456877947 CEST | 49740 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:16.880739927 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:16.880836010 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:16.880923033 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:16.881238937 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:16.881273985 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:17.740658998 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:17.740777969 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:17.742046118 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:17.742074013 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:17.742522001 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:17.743895054 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:17.743895054 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:17.743989944 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:18.171531916 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:18.171750069 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:18.171854019 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:18.171951056 CEST | 49742 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:18.171991110 CEST | 443 | 49742 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:18.636717081 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:18.636756897 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:18.636833906 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:18.637141943 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:18.637161016 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.559916973 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.560188055 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.561305046 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.561311007 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.562130928 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.567337990 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568030119 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568181038 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568269968 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568317890 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568419933 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568526983 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568633080 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568661928 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568783045 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568813086 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568959951 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.568984985 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.568994045 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.569111109 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.569134951 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.579571009 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.579725027 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.579761028 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.579777002 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.579796076 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.579958916 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.579984903 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:19.580003023 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.580033064 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:19.580091953 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:21.933140993 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:21.933376074 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:21.933434963 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:21.933478117 CEST | 49744 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:21.933490992 CEST | 443 | 49744 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:21.960803986 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:21.960833073 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:21.960895061 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:21.961242914 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:21.961256981 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:22.790865898 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:22.790962934 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:22.792165041 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:22.792182922 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:22.792568922 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:22.793822050 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:22.793888092 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:22.793926001 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:23.129004002 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:23.129239082 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:23.129405975 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:23.129581928 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:23.129582882 CEST | 49746 | 443 | 192.168.2.4 | 104.21.95.91 |
Oct 26, 2024 07:01:23.129594088 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Oct 26, 2024 07:01:23.129601002 CEST | 443 | 49746 | 104.21.95.91 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Oct 26, 2024 07:01:07.503952980 CEST | 59130 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 26, 2024 07:01:07.514802933 CEST | 53 | 59130 | 1.1.1.1 | 192.168.2.4 |
Oct 26, 2024 07:01:07.536637068 CEST | 55933 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 26, 2024 07:01:07.546303034 CEST | 53 | 55933 | 1.1.1.1 | 192.168.2.4 |
Oct 26, 2024 07:01:07.548238993 CEST | 54907 | 53 | 192.168.2.4 | 1.1.1.1 |
Oct 26, 2024 07:01:07.559782982 CEST | 53 | 54907 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Oct 26, 2024 07:01:07.503952980 CEST | 192.168.2.4 | 1.1.1.1 | 0xc0ad | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 07:01:07.536637068 CEST | 192.168.2.4 | 1.1.1.1 | 0xf44c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 07:01:07.548238993 CEST | 192.168.2.4 | 1.1.1.1 | 0x5a32 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 26, 2024 07:01:07.514802933 CEST | 1.1.1.1 | 192.168.2.4 | 0xc0ad | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 07:01:07.546303034 CEST | 1.1.1.1 | 192.168.2.4 | 0xf44c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Oct 26, 2024 07:01:07.559782982 CEST | 1.1.1.1 | 192.168.2.4 | 0x5a32 | No error (0) | 104.21.95.91 | A (IP address) | IN (0x0001) | false | ||
Oct 26, 2024 07:01:07.559782982 CEST | 1.1.1.1 | 192.168.2.4 | 0x5a32 | No error (0) | 172.67.170.64 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:08 UTC | 263 | OUT | |
2024-10-26 05:01:08 UTC | 8 | OUT | |
2024-10-26 05:01:09 UTC | 1008 | IN | |
2024-10-26 05:01:09 UTC | 7 | IN | |
2024-10-26 05:01:09 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49732 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:10 UTC | 264 | OUT | |
2024-10-26 05:01:10 UTC | 54 | OUT | |
2024-10-26 05:01:10 UTC | 1006 | IN | |
2024-10-26 05:01:10 UTC | 363 | IN | |
2024-10-26 05:01:10 UTC | 889 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN | |
2024-10-26 05:01:10 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49734 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:12 UTC | 282 | OUT | |
2024-10-26 05:01:12 UTC | 15331 | OUT | |
2024-10-26 05:01:12 UTC | 2839 | OUT | |
2024-10-26 05:01:13 UTC | 1023 | IN | |
2024-10-26 05:01:13 UTC | 23 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49738 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:14 UTC | 281 | OUT | |
2024-10-26 05:01:14 UTC | 8791 | OUT | |
2024-10-26 05:01:14 UTC | 1006 | IN | |
2024-10-26 05:01:14 UTC | 23 | IN | |
2024-10-26 05:01:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49740 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:15 UTC | 282 | OUT | |
2024-10-26 05:01:15 UTC | 15331 | OUT | |
2024-10-26 05:01:15 UTC | 5113 | OUT | |
2024-10-26 05:01:16 UTC | 1010 | IN | |
2024-10-26 05:01:16 UTC | 23 | IN | |
2024-10-26 05:01:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49742 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:17 UTC | 281 | OUT | |
2024-10-26 05:01:17 UTC | 1262 | OUT | |
2024-10-26 05:01:18 UTC | 1007 | IN | |
2024-10-26 05:01:18 UTC | 23 | IN | |
2024-10-26 05:01:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49744 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:19 UTC | 283 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:19 UTC | 15331 | OUT | |
2024-10-26 05:01:21 UTC | 1016 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49746 | 104.21.95.91 | 443 | 2892 | C:\Users\user\Desktop\CheatInjector.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-10-26 05:01:22 UTC | 264 | OUT | |
2024-10-26 05:01:22 UTC | 89 | OUT | |
2024-10-26 05:01:23 UTC | 1008 | IN | |
2024-10-26 05:01:23 UTC | 54 | IN | |
2024-10-26 05:01:23 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 01:01:06 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\CheatInjector.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4c0000 |
File size: | 539'648 bytes |
MD5 hash: | 9FB7DA682B76ACBDF560398AA193FF7A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 01:01:06 |
Start date: | 26/10/2024 |
Path: | C:\Users\user\Desktop\CheatInjector.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x4c0000 |
File size: | 539'648 bytes |
MD5 hash: | 9FB7DA682B76ACBDF560398AA193FF7A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 01:01:07 |
Start date: | 26/10/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd50000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 1.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 4.2% |
Total number of Nodes: | 544 |
Total number of Limit Nodes: | 13 |
Graph
Function 004C59D6 Relevance: 19.4, APIs: 9, Strings: 2, Instructions: 141memoryfileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004E1228 Relevance: 17.8, APIs: 9, Strings: 1, Instructions: 273COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DA82C Relevance: 1.6, APIs: 1, Instructions: 54COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050E780 Relevance: 24.0, Strings: 18, Instructions: 1484COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EF705 Relevance: 16.0, Strings: 12, Instructions: 987COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00510D50 Relevance: 15.7, Strings: 12, Instructions: 730COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00529460 Relevance: 15.3, Strings: 12, Instructions: 297COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FBEA0 Relevance: 11.5, Strings: 9, Instructions: 280COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DE2D0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EF430 Relevance: 10.2, Strings: 7, Instructions: 1454COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DF175 Relevance: 10.2, APIs: 1, Strings: 4, Instructions: 1436COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00531410 Relevance: 9.3, Strings: 7, Instructions: 536COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00529B40 Relevance: 6.5, Strings: 5, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DB239 Relevance: 6.2, APIs: 4, Instructions: 206fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C777F Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052D4C0 Relevance: 5.6, Strings: 4, Instructions: 583COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FD3E0 Relevance: 5.4, Strings: 4, Instructions: 409COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FF0B5 Relevance: 5.3, Strings: 4, Instructions: 283COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051DD30 Relevance: 5.2, Strings: 4, Instructions: 205COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00516690 Relevance: 5.2, Strings: 4, Instructions: 191COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FD9BD Relevance: 5.1, Strings: 4, Instructions: 81COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DDF54 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005136A0 Relevance: 4.2, Strings: 3, Instructions: 454COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051EC6D Relevance: 4.2, Strings: 3, Instructions: 442COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004EF758 Relevance: 4.1, Strings: 3, Instructions: 389COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FC230 Relevance: 4.1, Strings: 3, Instructions: 374COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005184BB Relevance: 4.1, Strings: 3, Instructions: 344COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00510178 Relevance: 4.1, Strings: 3, Instructions: 317COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051AE2E Relevance: 3.9, Strings: 3, Instructions: 110COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D59C6 Relevance: 3.5, APIs: 1, Strings: 1, Instructions: 24COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00511A00 Relevance: 3.0, Strings: 2, Instructions: 454COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005154E0 Relevance: 2.9, Strings: 2, Instructions: 438COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050FCA6 Relevance: 2.8, Strings: 2, Instructions: 333COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005194D0 Relevance: 2.8, Strings: 2, Instructions: 317COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052CFE0 Relevance: 2.8, Strings: 2, Instructions: 293COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E435 Relevance: 2.8, Strings: 2, Instructions: 270COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E4CB Relevance: 2.8, Strings: 2, Instructions: 267COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E50B Relevance: 2.8, Strings: 2, Instructions: 266COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E4FB Relevance: 2.7, Strings: 2, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C710C Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051D470 Relevance: 1.7, Strings: 1, Instructions: 425COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C4C86 Relevance: 1.6, APIs: 1, Instructions: 126COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DE1A7 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FF83D Relevance: 1.6, Strings: 1, Instructions: 320COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CE821 Relevance: 1.6, Strings: 1, Instructions: 314COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050C995 Relevance: 1.6, Strings: 1, Instructions: 304COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DE3D6 Relevance: 1.5, APIs: 1, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D54FD Relevance: 1.5, APIs: 1, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C790C Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F9100 Relevance: 1.5, Strings: 1, Instructions: 252COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F821 Relevance: 1.5, Strings: 1, Instructions: 243COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00518990 Relevance: 1.5, Strings: 1, Instructions: 225COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00520059 Relevance: 1.4, Strings: 1, Instructions: 191COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00532D70 Relevance: 1.4, Strings: 1, Instructions: 134COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050CDF2 Relevance: 1.4, Strings: 1, Instructions: 132COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052D370 Relevance: 1.4, Strings: 1, Instructions: 121COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FDDD8 Relevance: 1.4, Strings: 1, Instructions: 112COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050D45F Relevance: 1.4, Strings: 1, Instructions: 111COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00533240 Relevance: 1.3, Strings: 1, Instructions: 91COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050BC6A Relevance: 1.3, Strings: 1, Instructions: 69COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051B75D Relevance: 1.3, Strings: 1, Instructions: 66COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C511C Relevance: 1.3, Strings: 1, Instructions: 24COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FA700 Relevance: .8, Instructions: 808COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00512070 Relevance: .8, Instructions: 781COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F59D0 Relevance: .7, Instructions: 674COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F9BF0 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F63F0 Relevance: .6, Instructions: 610COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8B30 Relevance: .5, Instructions: 504COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F1D10 Relevance: .4, Instructions: 404COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050DBAD Relevance: .4, Instructions: 386COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F1C8 Relevance: .4, Instructions: 369COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00530F30 Relevance: .3, Instructions: 345COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CEB69 Relevance: .3, Instructions: 344COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050335D Relevance: .3, Instructions: 343COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051E895 Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051F417 Relevance: .3, Instructions: 328COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050544A Relevance: .3, Instructions: 320COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F9760 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00533BA0 Relevance: .3, Instructions: 291COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00521D70 Relevance: .3, Instructions: 286COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005338C0 Relevance: .3, Instructions: 281COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005335E0 Relevance: .3, Instructions: 275COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00520B45 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F3969 Relevance: .3, Instructions: 274COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005066E7 Relevance: .3, Instructions: 272COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00533350 Relevance: .3, Instructions: 258COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 005221C0 Relevance: .2, Instructions: 243COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00515280 Relevance: .2, Instructions: 241COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051B420 Relevance: .2, Instructions: 233COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00511690 Relevance: .2, Instructions: 224COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051A732 Relevance: .2, Instructions: 222COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F38D0 Relevance: .2, Instructions: 222COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F4440 Relevance: .2, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00523890 Relevance: .2, Instructions: 208COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050A05C Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00529200 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FC730 Relevance: .2, Instructions: 185COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050B826 Relevance: .2, Instructions: 167COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F4190 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00523AF0 Relevance: .2, Instructions: 162COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00503FE7 Relevance: .1, Instructions: 124COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00530555 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00532366 Relevance: .1, Instructions: 111COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F30C0 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00519850 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F8181 Relevance: .1, Instructions: 87COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00526DA0 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051CEE0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004F5650 Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051AB1E Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0052F6BD Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004FCC3F Relevance: .0, Instructions: 30COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00530250 Relevance: .0, Instructions: 27COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D951A Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0050D437 Relevance: .0, Instructions: 16COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D18CF Relevance: .0, Instructions: 12COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00513E33 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051AABE Relevance: .0, Instructions: 10COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0051051C Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C6AC4 Relevance: 14.0, APIs: 4, Strings: 4, Instructions: 19libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D7E8F Relevance: 12.5, APIs: 6, Strings: 1, Instructions: 298COMMONLIBRARYCODE
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CA408 Relevance: 10.8, APIs: 3, Strings: 3, Instructions: 303COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D56C6 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D18F1 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C68DA Relevance: 9.2, APIs: 6, Instructions: 175COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CA1B1 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 168COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C81DC Relevance: 7.0, APIs: 1, Strings: 3, Instructions: 43COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CB1E2 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DAF45 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D09D6 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004DBEF4 Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C2037 Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C1ECC Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C1F45 Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C1FBE Relevance: 6.0, APIs: 4, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004CA7AD Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 112COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C616F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 49COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004C75A9 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 45COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D5A41 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 26COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004D58C7 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 22memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|