Windows
Analysis Report
5_6253708004881862888.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 5_6253708004881862888.exe (PID: 2352 cmdline:
"C:\Users\ user\Deskt op\5_62537 0800488186 2888.exe" MD5: 62DAD59C8A4BF1E860671C00D12D6BAE) - conhost.exe (PID: 5940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - RegAsm.exe (PID: 1412 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\Reg Asm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13) - WerFault.exe (PID: 7664 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 1 412 -s 185 2 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["traineiwnqo.shop", "stagedchheiqwo.shop", "locatedblsoqp.shop", "caffegclasiqwp.shop", "evoliutwoqm.shop", "millyscroqwp.shop", "muggudrowiwm.shop", "stamppreewntnq.shop", "condedqpwqm.shop"], "Build id": "LPnhqo--bvnqgemxfyyo"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_4 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.045543+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:17.462906+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49701 | 23.55.153.106 | 443 | TCP |
2024-12-18T11:40:19.820798+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:22.264240+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:24.422105+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49710 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:26.856672+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49716 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:28.953720+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49723 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:31.345970+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49730 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:34.137977+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49742 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:37.998967+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49747 | 104.21.66.86 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.475338+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:20.639675+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:22.979787+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:38.790701+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.7 | 49747 | 104.21.66.86 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:15.687016+0100 | 2055474 | 1 | A Network Trojan was detected | 192.168.2.7 | 59309 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.773766+0100 | 2055475 | 1 | A Network Trojan was detected | 192.168.2.7 | 56654 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.919416+0100 | 2055477 | 1 | A Network Trojan was detected | 192.168.2.7 | 61846 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.482513+0100 | 2055479 | 1 | A Network Trojan was detected | 192.168.2.7 | 49410 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:15.162418+0100 | 2055480 | 1 | A Network Trojan was detected | 192.168.2.7 | 58373 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:15.302899+0100 | 2055481 | 1 | A Network Trojan was detected | 192.168.2.7 | 59516 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:15.451451+0100 | 2055482 | 1 | A Network Trojan was detected | 192.168.2.7 | 57263 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.629840+0100 | 2055483 | 1 | A Network Trojan was detected | 192.168.2.7 | 53966 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.475338+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:20.639675+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:22.979787+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.045543+0100 | 2058298 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:11.288419+0100 | 2058297 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 53162 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:12.292864+0100 | 2058297 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 53162 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:27.670570+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.7 | 49716 | 104.21.66.86 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:14.050441+0100 | 2822521 | 1 | Domain Observed Used for C2 Detected | 104.131.68.180 | 443 | 192.168.2.7 | 49700 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:18.330473+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 49701 | 23.55.153.106 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira: |
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 8_2_00413F33 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 8_2_0041F860 | |
Source: | Code function: | 8_2_0040B9F0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_0041434A | |
Source: | Code function: | 8_2_0041434A | |
Source: | Code function: | 8_2_0043FBA0 | |
Source: | Code function: | 8_2_0040EC7D | |
Source: | Code function: | 8_2_0040AC10 | |
Source: | Code function: | 8_2_0040A670 | |
Source: | Code function: | 8_2_00413F33 | |
Source: | Code function: | 8_2_00415F90 | |
Source: | Code function: | 8_2_00415F90 | |
Source: | Code function: | 8_2_0041D042 | |
Source: | Code function: | 8_2_0041D042 | |
Source: | Code function: | 8_2_0041D042 | |
Source: | Code function: | 8_2_00401000 | |
Source: | Code function: | 8_2_00432810 | |
Source: | Code function: | 8_2_0041182A | |
Source: | Code function: | 8_2_0041182A | |
Source: | Code function: | 8_2_0041D0A0 | |
Source: | Code function: | 8_2_0041D0A0 | |
Source: | Code function: | 8_2_00440160 | |
Source: | Code function: | 8_2_0041B100 | |
Source: | Code function: | 8_2_00420911 | |
Source: | Code function: | 8_2_00404130 | |
Source: | Code function: | 8_2_00414930 | |
Source: | Code function: | 8_2_00414930 | |
Source: | Code function: | 8_2_00414930 | |
Source: | Code function: | 8_2_00413243 | |
Source: | Code function: | 8_2_00415A30 | |
Source: | Code function: | 8_2_00422AC2 | |
Source: | Code function: | 8_2_0041BAC3 | |
Source: | Code function: | 8_2_0041BAC3 | |
Source: | Code function: | 8_2_00410AED | |
Source: | Code function: | 8_2_0041B360 | |
Source: | Code function: | 8_2_0041B360 | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_004233D0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_0043EC60 | |
Source: | Code function: | 8_2_00408C00 | |
Source: | Code function: | 8_2_00408C00 | |
Source: | Code function: | 8_2_00439CF0 | |
Source: | Code function: | 8_2_0041EC8C | |
Source: | Code function: | 8_2_00404490 | |
Source: | Code function: | 8_2_004134A0 | |
Source: | Code function: | 8_2_00427554 | |
Source: | Code function: | 8_2_00410511 | |
Source: | Code function: | 8_2_00411D2E | |
Source: | Code function: | 8_2_00423DB0 | |
Source: | Code function: | 8_2_00422650 | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_00421E0D | |
Source: | Code function: | 8_2_00421E0D | |
Source: | Code function: | 8_2_00421E0D | |
Source: | Code function: | 8_2_00411E30 | |
Source: | Code function: | 8_2_00411E30 | |
Source: | Code function: | 8_2_0043EF20 | |
Source: | Code function: | 8_2_004117E0 | |
Source: | Code function: | 8_2_004117E0 | |
Source: | Code function: | 8_2_0043B780 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 8_2_00432460 |
Source: | Code function: | 8_2_00432460 |
Source: | Code function: | 8_2_00424D53 |
System Summary |
---|
Source: | Large array initialization: |
Source: | Code function: | 8_2_0041F860 | |
Source: | Code function: | 8_2_00437160 | |
Source: | Code function: | 8_2_0041A1CA | |
Source: | Code function: | 8_2_0040B9F0 | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_0041434A | |
Source: | Code function: | 8_2_0043FBA0 | |
Source: | Code function: | 8_2_0040EC7D | |
Source: | Code function: | 8_2_0040AC10 | |
Source: | Code function: | 8_2_0041F420 | |
Source: | Code function: | 8_2_0043DC30 | |
Source: | Code function: | 8_2_00429C3F | |
Source: | Code function: | 8_2_0041C560 | |
Source: | Code function: | 8_2_0043D6A2 | |
Source: | Code function: | 8_2_00413F33 | |
Source: | Code function: | 8_2_0041D042 | |
Source: | Code function: | 8_2_00401000 | |
Source: | Code function: | 8_2_0042A020 | |
Source: | Code function: | 8_2_0043E8C2 | |
Source: | Code function: | 8_2_00405880 | |
Source: | Code function: | 8_2_0041D0A0 | |
Source: | Code function: | 8_2_0043E950 | |
Source: | Code function: | 8_2_00440160 | |
Source: | Code function: | 8_2_0042D911 | |
Source: | Code function: | 8_2_00414930 | |
Source: | Code function: | 8_2_0042C9C6 | |
Source: | Code function: | 8_2_004029D0 | |
Source: | Code function: | 8_2_004121A8 | |
Source: | Code function: | 8_2_0042527C | |
Source: | Code function: | 8_2_0041BAC3 | |
Source: | Code function: | 8_2_0042FAD0 | |
Source: | Code function: | 8_2_00410AED | |
Source: | Code function: | 8_2_00406280 | |
Source: | Code function: | 8_2_0043E2BF | |
Source: | Code function: | 8_2_00434B00 | |
Source: | Code function: | 8_2_00433B0B | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_00426AA0 | |
Source: | Code function: | 8_2_00418BBF | |
Source: | Code function: | 8_2_0042A451 | |
Source: | Code function: | 8_2_00420458 | |
Source: | Code function: | 8_2_00432460 | |
Source: | Code function: | 8_2_00436460 | |
Source: | Code function: | 8_2_0043EC60 | |
Source: | Code function: | 8_2_00408C00 | |
Source: | Code function: | 8_2_0042DC2A | |
Source: | Code function: | 8_2_0042D483 | |
Source: | Code function: | 8_2_0042548A | |
Source: | Code function: | 8_2_0041EC8C | |
Source: | Code function: | 8_2_00404490 | |
Source: | Code function: | 8_2_0042B4A1 | |
Source: | Code function: | 8_2_00427554 | |
Source: | Code function: | 8_2_0040D570 | |
Source: | Code function: | 8_2_0043BDC0 | |
Source: | Code function: | 8_2_00431DE3 | |
Source: | Code function: | 8_2_00430654 | |
Source: | Code function: | 8_2_00418666 | |
Source: | Code function: | 8_2_00411E0E | |
Source: | Code function: | 8_2_00421E0D | |
Source: | Code function: | 8_2_00407620 | |
Source: | Code function: | 8_2_0043162B | |
Source: | Code function: | 8_2_00411E30 | |
Source: | Code function: | 8_2_0042EE34 | |
Source: | Code function: | 8_2_004366C0 | |
Source: | Code function: | 8_2_00404EE0 | |
Source: | Code function: | 8_2_0043FE90 | |
Source: | Code function: | 8_2_00430EA1 | |
Source: | Code function: | 8_2_00402709 | |
Source: | Code function: | 8_2_0042CF2A | |
Source: | Code function: | 8_2_00402733 | |
Source: | Code function: | 8_2_004217C0 | |
Source: | Code function: | 8_2_00406F80 | |
Source: | Code function: | 8_2_004127AA |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 8_2_00437570 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Thread delayed: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_8-15444 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 8_2_0043D1C0 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Code function: | 4_2_02F7217D |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 411 Process Injection | 1 Masquerading | 2 OS Credential Dumping | 131 Security Software Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Disable or Modify Tools | LSASS Memory | 1 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 141 Virtualization/Sandbox Evasion | Security Account Manager | 141 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 41 Data from Local System | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 411 Process Injection | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | 2 Clipboard Data | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Deobfuscate/Decode Files or Information | LSA Secrets | 22 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 3 Obfuscated Files or Information | Cached Domain Credentials | Wi-Fi Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 2 Software Packing | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 1 DLL Side-Loading | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
79% | Virustotal | Browse | ||
76% | ReversingLabs | ByteCode-MSIL.Trojan.LummaStealer | ||
100% | Avira | TR/AD.Nekark.fqicu |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 23.55.153.106 | true | false | high | |
lev-tolstoi.com | 104.21.66.86 | true | false | high | |
muggudrowiwm.shop | 104.131.68.180 | true | true | unknown | |
locatedblsoqp.shop | unknown | unknown | true | unknown | |
caffegclasiqwp.shop | unknown | unknown | true | unknown | |
condedqpwqm.shop | unknown | unknown | true | unknown | |
millyscroqwp.shop | unknown | unknown | true | unknown | |
stamppreewntnq.shop | unknown | unknown | true | unknown | |
evoliutwoqm.shop | unknown | unknown | true | unknown | |
stagedchheiqwo.shop | unknown | unknown | true | unknown | |
traineiwnqo.shop | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown | |
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.66.86 | lev-tolstoi.com | United States | 13335 | CLOUDFLARENETUS | false | |
23.55.153.106 | steamcommunity.com | United States | 20940 | AKAMAI-ASN1EU | false | |
104.131.68.180 | muggudrowiwm.shop | United States | 14061 | DIGITALOCEAN-ASNUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577316 |
Start date and time: | 2024-12-18 11:39:14 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 7s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 5_6253708004881862888.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/6@12/3 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 13.107.246.63, 172.202.163.200, 40.126.53.10
- Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
05:40:13 | API Interceptor | |
07:22:36 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.66.86 | Get hash | malicious | FormBook | Browse |
| |
23.55.153.106 | Get hash | malicious | Stealc, Vidar | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse | |||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar | Browse | |||
104.131.68.180 | Get hash | malicious | Tinba | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
lev-tolstoi.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
steamcommunity.com | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Stealc, Xmrig | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AKAMAI-ASN1EU | Get hash | malicious | Stealc, Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
DIGITALOCEAN-ASNUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | Can Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
| ||
Get hash | malicious | AgentTesla, GuLoader | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | PureCrypter | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RegAsm.exe_31b44a5562c15e927d8eb7658df48455463358c_ee039a57_67d72958-09c2-47ba-897e-02d8f04fc406\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 1.0810477807696426 |
Encrypted: | false |
SSDEEP: | 192:b7wmeFy/d+0o0BU/AjezEK2zszuiFR+Z24IO8Zk:fwAd+0DBU/AjeogzuiFR+Y4IO8Z |
MD5: | 4568664AD8D8EEF08ED2A208886983F9 |
SHA1: | FD084FC8DB6B8EC79521B18F3EAE1846B85DDE62 |
SHA-256: | F0CDB986F2B4F67C18FC33750EA1C6FF8AF6E4BD43C671862F21AFE5E6BF0378 |
SHA-512: | EDA9D1C61093C705332F820AA08528417FECA6A09240551ACDB44CAF7391190B4ACF64C98F29780431A146B30640EA59AB249B743B99431828D9B030C40D2CD1 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 108266 |
Entropy (8bit): | 2.0472807471582573 |
Encrypted: | false |
SSDEEP: | 384:DAXZXOJd895HnnxauERWYV0Vk8ZFxkbyj9pLtDDNpiQhYHIv37cTF6Is6Qcb6yn:cXZ+k95nERvxYFNDLNWl6C |
MD5: | E42A7B0824319BCD8DEA90287E237F74 |
SHA1: | E90F9FDBB4195BFCC5F44578A83476C45604250B |
SHA-256: | 27CA7ADBC36DCA4B36231A6B26462006EBB92652381334DFC60199E361CA5A9B |
SHA-512: | CE2C534AB4A40C59ACFFC35B23DF83795C392ECF74B8CF3BEF2396BB4BA27EA6C2EE0FA95C63221ED0D44641996699FDC204C5265D2894468FF307BF3CA28E22 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 6308 |
Entropy (8bit): | 3.722263922233064 |
Encrypted: | false |
SSDEEP: | 96:RSIU6o7wVetbwX6IOYYtEBhQE/YQz5aM4U489bP9esfyA9lm:R6l7wVeJwX6IOYYq5pr489b1esfyAHm |
MD5: | AE711916F74442CC123DB4D40B3461E8 |
SHA1: | DC4FE7E99DB8087AFF98F4A006E11710F11B7269 |
SHA-256: | 6BF76F92DDA872F6EC2279C790887AA29F4EEB7212163CECD6AA89937C57ECE9 |
SHA-512: | 95F5842E2E023C2395445461AD05BF2A795896D0BF7F4DD0C5A57CB518278BE8473DE3B3EBCB059EEDC5584F086C1975FF79A9F08DCEB12AE6A741C75C153EBA |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4628 |
Entropy (8bit): | 4.453609227217728 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsNJg77aI9C1WpW8VYIYm8M4Jfu9s9FGXR+q8oSIlQgLuOLuArd:uIjfnI74E7VsJfuqOBvSMBukuArd |
MD5: | B37AEF2C6D28D86376D208C5D898173E |
SHA1: | 2F20A3E1685864450B0BDCFDDFCA60A93DD57D83 |
SHA-256: | 48CEE72FE115E2E842DCE052FC52B71AB5A59BB60DC75144C9C6095FA0BF92E8 |
SHA-512: | 7FAA64EEA3227583907E6011FD6CC26EEB46F916035FD9969CE6E3BF2DD3B8FA04B42D026D8DB0D2D72A880D47B545D837B0F82BE3CB2068413BBAA0CF0B7027 |
Malicious: | false |
Reputation: | low |
Preview: |
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5_6253708004881862888.exe.log
Download File
Process: | C:\Users\user\Desktop\5_6253708004881862888.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 42 |
Entropy (8bit): | 4.0050635535766075 |
Encrypted: | false |
SSDEEP: | 3:QHXMKa/xwwUy:Q3La/xwQ |
MD5: | 84CFDB4B995B1DBF543B26B86C863ADC |
SHA1: | D2F47764908BF30036CF8248B9FF5541E2711FA2 |
SHA-256: | D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B |
SHA-512: | 485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE |
Malicious: | true |
Reputation: | high, very likely benign file |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.417552483791737 |
Encrypted: | false |
SSDEEP: | 6144:Ecifpi6ceLPL9skLmb0mdSWSPtaJG8nAgex285i2MMhA20X4WABlGuNL5+:pi58dSWIZBk2MM6AFBlo |
MD5: | 1BDFEC401D3ADAC659D252E496E746AE |
SHA1: | 97D288247D1E931F9F8AC219B4A9FCAF57CDE7B5 |
SHA-256: | 48C5B3BC0963FAF54979BBD94BA9F678EA70171628CDE354DE55B88E68AECF66 |
SHA-512: | 1F2E56F9572898270002FE15AD9C37286DEAB40F6FF8FA2B243957E354142D668D364085F047F1D13FC1A748FFD2227A4D8D2195BD4FDF3414512559918014E6 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.985969010824924 |
TrID: |
|
File name: | 5_6253708004881862888.exe |
File size: | 319'488 bytes |
MD5: | 62dad59c8a4bf1e860671c00d12d6bae |
SHA1: | 80e845f3b3a3e94c9211ff88b02f21a70876544c |
SHA256: | 7722b15ba8511393f25c183b793ceb9c9b14d5a211e1161b40fde26d8be9bcba |
SHA512: | 4658bf2f25792771292c6d2f1a7cc771dd2665f20a6580ceb375acd5f1170635eb6436f201cce96e14cd0b5ca7df92cfb2916d878d746a9cd2fd6117ef5bef08 |
SSDEEP: | 6144:k3MnOZq70Pw/yC/L/L6DFWzcRpCCgC+H5x1f7XLDNCk56dxhr3lSmXKor:k8X70Pw/y48FscRgC+HV7b5363hr3ImL |
TLSH: | 3D642390B7F57126EECF0576B30F4624EA7664701DBD6BD9204CABC69DAA130B214F23 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ........@.. .......................@............`................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x44f2de |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66D8E781 [Wed Sep 4 23:04:33 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [00402000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x4f290 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x50000 | 0x602 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x52000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x4f158 | 0x1c | .text |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0x4d2e4 | 0x4d400 | 1c26281cdfbacaa23e0f18cbdc6a08a5 | False | 0.9941753893608414 | data | 7.995899101105081 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0x50000 | 0x602 | 0x800 | 9639fa6120fd371837905935aa41ec17 | False | 0.34619140625 | data | 3.469016537160503 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x52000 | 0xc | 0x200 | 2da99b1c6b7aa0acb3c2f90b041baac5 | False | 0.044921875 | data | 0.10191042566270775 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x500a0 | 0x378 | data | English | United States | 0.4560810810810811 |
RT_MANIFEST | 0x50418 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5469387755102041 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T11:40:11.288419+0100 | 2058297 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (muggudrowiwm .shop) | 1 | 192.168.2.7 | 53162 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:12.292864+0100 | 2058297 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (muggudrowiwm .shop) | 1 | 192.168.2.7 | 53162 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:14.045543+0100 | 2058298 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (muggudrowiwm .shop in TLS SNI) | 1 | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:14.045543+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:14.050441+0100 | 2822521 | ETPRO MALWARE Malicious SSL Certificate Detected (Linux.Rex Scanner) | 1 | 104.131.68.180 | 443 | 192.168.2.7 | 49700 | TCP |
2024-12-18T11:40:14.475338+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:14.475338+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | TCP |
2024-12-18T11:40:14.482513+0100 | 2055479 | ET MALWARE Lumma Stealer Domain in DNS Lookup (locatedblsoqp .shop) | 1 | 192.168.2.7 | 49410 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:14.629840+0100 | 2055483 | ET MALWARE Lumma Stealer Domain in DNS Lookup (traineiwnqo .shop) | 1 | 192.168.2.7 | 53966 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:14.773766+0100 | 2055475 | ET MALWARE Lumma Stealer Domain in DNS Lookup (condedqpwqm .shop) | 1 | 192.168.2.7 | 56654 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:14.919416+0100 | 2055477 | ET MALWARE Lumma Stealer Domain in DNS Lookup (evoliutwoqm .shop) | 1 | 192.168.2.7 | 61846 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:15.162418+0100 | 2055480 | ET MALWARE Lumma Stealer Domain in DNS Lookup (millyscroqwp .shop) | 1 | 192.168.2.7 | 58373 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:15.302899+0100 | 2055481 | ET MALWARE Lumma Stealer Domain in DNS Lookup (stagedchheiqwo .shop) | 1 | 192.168.2.7 | 59516 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:15.451451+0100 | 2055482 | ET MALWARE Lumma Stealer Domain in DNS Lookup (stamppreewntnq .shop) | 1 | 192.168.2.7 | 57263 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:15.687016+0100 | 2055474 | ET MALWARE Lumma Stealer Domain in DNS Lookup (caffegclasiqwp .shop) | 1 | 192.168.2.7 | 59309 | 1.1.1.1 | 53 | UDP |
2024-12-18T11:40:17.462906+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49701 | 23.55.153.106 | 443 | TCP |
2024-12-18T11:40:18.330473+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.7 | 49701 | 23.55.153.106 | 443 | TCP |
2024-12-18T11:40:19.820798+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:20.639675+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:20.639675+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:22.264240+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:22.979787+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:22.979787+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:24.422105+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49710 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:26.856672+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49716 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:27.670570+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.7 | 49716 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:28.953720+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49723 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:31.345970+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49730 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:34.137977+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49742 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:37.998967+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49747 | 104.21.66.86 | 443 | TCP |
2024-12-18T11:40:38.790701+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.7 | 49747 | 104.21.66.86 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 11:40:12.810573101 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:12.810628891 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:12.810935974 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:12.814395905 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:12.814412117 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.045433044 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.045542955 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.050430059 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.050441027 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.050842047 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.103302956 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.127693892 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.127844095 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.127878904 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.475357056 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.475455046 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.475528002 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.476883888 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.476897955 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:14.477303982 CET | 49700 | 443 | 192.168.2.7 | 104.131.68.180 |
Dec 18, 2024 11:40:14.477308989 CET | 443 | 49700 | 104.131.68.180 | 192.168.2.7 |
Dec 18, 2024 11:40:16.058733940 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:16.058784008 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:16.058854103 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:16.059710979 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:16.059741974 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:17.462773085 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:17.462905884 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:17.502456903 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:17.502494097 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:17.502777100 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:17.504281044 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:17.547334909 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.330535889 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.330559969 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.330574036 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.330610991 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.330630064 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.330667973 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.330729961 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.423187971 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.423247099 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.423310041 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.423333883 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.423377991 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.452753067 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.452801943 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.452853918 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.452935934 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.452992916 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.457165956 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.457184076 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.457210064 CET | 49701 | 443 | 192.168.2.7 | 23.55.153.106 |
Dec 18, 2024 11:40:18.457216978 CET | 443 | 49701 | 23.55.153.106 | 192.168.2.7 |
Dec 18, 2024 11:40:18.604460955 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:18.604507923 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:18.604605913 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:18.605035067 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:18.605048895 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:19.820621967 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:19.820797920 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:19.825043917 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:19.825052977 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:19.825436115 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:19.827169895 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:19.827222109 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:19.827333927 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:20.639679909 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:20.639781952 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:20.639915943 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:20.852575064 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:20.852605104 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:20.852617979 CET | 49702 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:20.852624893 CET | 443 | 49702 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:21.047418118 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:21.047503948 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:21.047585011 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:21.048191071 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:21.048202038 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.264111996 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.264240026 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.265873909 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.265885115 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.266767025 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.268295050 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.268316031 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.268498898 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.979861975 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.979995012 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.980103970 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.980148077 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.980216026 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.980272055 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.980289936 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.992857933 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.992885113 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.992968082 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.992973089 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:22.993019104 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:22.993024111 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.001408100 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.001526117 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.001532078 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.056515932 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.099260092 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.150278091 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.150301933 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.170443058 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.170552969 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.170559883 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.174012899 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.174068928 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.174072981 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.174099922 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.174145937 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.174263000 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.174276114 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.174329042 CET | 49704 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.174334049 CET | 443 | 49704 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.211545944 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.211599112 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:23.211666107 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.212220907 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:23.212234974 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:24.422027111 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:24.422105074 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:24.423556089 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:24.423568964 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:24.424211025 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:24.425750971 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:24.425945044 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:24.425992966 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:25.265291929 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:25.265408993 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:25.265537977 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:25.267936945 CET | 49710 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:25.267959118 CET | 443 | 49710 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:25.626120090 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:25.626164913 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:25.626236916 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:25.626619101 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:25.626629114 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:26.856492996 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:26.856672049 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:26.858181953 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:26.858194113 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:26.859193087 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:26.860641956 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:26.860836983 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:26.860873938 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:26.860937119 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:26.860943079 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:27.670588970 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:27.670722008 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:27.670790911 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:27.670979023 CET | 49716 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:27.670999050 CET | 443 | 49716 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:27.742964983 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:27.743001938 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:27.743113995 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:27.743427992 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:27.743437052 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:28.953633070 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:28.953720093 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.017816067 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.017841101 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.018234968 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.065058947 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.098377943 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.104782104 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.104808092 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.104928017 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.104939938 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.977508068 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.977627993 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:29.977691889 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.977960110 CET | 49723 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:29.977976084 CET | 443 | 49723 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:30.127104044 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:30.127142906 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:30.127208948 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:30.128559113 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:30.128571033 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:31.345885038 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:31.345969915 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:31.348031044 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:31.348042011 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:31.348946095 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:31.361788034 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:31.361962080 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:31.361973047 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:32.088988066 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:32.089104891 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:32.091599941 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:32.157643080 CET | 49730 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:32.157680988 CET | 443 | 49730 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:32.929191113 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:32.929239035 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:32.929316044 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:32.929721117 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:32.929732084 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.137897968 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.137976885 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.140336990 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.140345097 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.140579939 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.153371096 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.154488087 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.154515028 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.154609919 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.154633045 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.154743910 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.154781103 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.154905081 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.154934883 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.155076027 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155108929 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.155253887 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155282021 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.155294895 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155308962 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.155436993 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155467033 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.155493021 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155608892 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.155635118 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.199332952 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.199672937 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.199702978 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.199724913 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.199740887 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.199781895 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.199800968 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:34.199817896 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:34.199822903 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:36.785080910 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:36.785360098 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:36.785501957 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:36.785718918 CET | 49742 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:36.785762072 CET | 443 | 49742 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:36.789391994 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:36.789457083 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:36.789550066 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:36.789865971 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:36.789881945 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:37.998816967 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:37.998966932 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.000462055 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.000468969 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.000699043 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.001895905 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.001923084 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.001969099 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.790688038 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.790771008 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.790818930 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.812017918 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.812047005 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Dec 18, 2024 11:40:38.812061071 CET | 49747 | 443 | 192.168.2.7 | 104.21.66.86 |
Dec 18, 2024 11:40:38.812069893 CET | 443 | 49747 | 104.21.66.86 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 11:40:11.288419008 CET | 53162 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:12.292864084 CET | 53162 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:12.803462982 CET | 53 | 53162 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:12.803482056 CET | 53 | 53162 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:14.482512951 CET | 49410 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:14.621618986 CET | 53 | 49410 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:14.629839897 CET | 53966 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:14.769387007 CET | 53 | 53966 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:14.773766041 CET | 56654 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:14.913814068 CET | 53 | 56654 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:14.919415951 CET | 61846 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:15.160310984 CET | 53 | 61846 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:15.162417889 CET | 58373 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:15.300769091 CET | 53 | 58373 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:15.302898884 CET | 59516 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:15.447132111 CET | 53 | 59516 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:15.451451063 CET | 57263 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:15.683012009 CET | 53 | 57263 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:15.687016010 CET | 59309 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:15.912095070 CET | 53 | 59309 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:15.916111946 CET | 60601 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:16.056977987 CET | 53 | 60601 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 11:40:18.461652040 CET | 50289 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 11:40:18.602966070 CET | 53 | 50289 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 11:40:11.288419008 CET | 192.168.2.7 | 1.1.1.1 | 0x61c2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:12.292864084 CET | 192.168.2.7 | 1.1.1.1 | 0x61c2 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.482512951 CET | 192.168.2.7 | 1.1.1.1 | 0x6f0b | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.629839897 CET | 192.168.2.7 | 1.1.1.1 | 0xc3de | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.773766041 CET | 192.168.2.7 | 1.1.1.1 | 0xe5bd | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.919415951 CET | 192.168.2.7 | 1.1.1.1 | 0xc1bc | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.162417889 CET | 192.168.2.7 | 1.1.1.1 | 0x156c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.302898884 CET | 192.168.2.7 | 1.1.1.1 | 0x9e20 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.451451063 CET | 192.168.2.7 | 1.1.1.1 | 0x9253 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.687016010 CET | 192.168.2.7 | 1.1.1.1 | 0x4336 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.916111946 CET | 192.168.2.7 | 1.1.1.1 | 0xf8fb | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:18.461652040 CET | 192.168.2.7 | 1.1.1.1 | 0x642e | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 11:40:12.803462982 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 104.131.68.180 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:12.803462982 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 178.62.201.34 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:12.803462982 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 45.77.249.79 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:12.803482056 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 104.131.68.180 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:12.803482056 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 178.62.201.34 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:12.803482056 CET | 1.1.1.1 | 192.168.2.7 | 0x61c2 | No error (0) | 45.77.249.79 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:14.621618986 CET | 1.1.1.1 | 192.168.2.7 | 0x6f0b | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.769387007 CET | 1.1.1.1 | 192.168.2.7 | 0xc3de | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:14.913814068 CET | 1.1.1.1 | 192.168.2.7 | 0xe5bd | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.160310984 CET | 1.1.1.1 | 192.168.2.7 | 0xc1bc | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.300769091 CET | 1.1.1.1 | 192.168.2.7 | 0x156c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.447132111 CET | 1.1.1.1 | 192.168.2.7 | 0x9e20 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.683012009 CET | 1.1.1.1 | 192.168.2.7 | 0x9253 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:15.912095070 CET | 1.1.1.1 | 192.168.2.7 | 0x4336 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 11:40:16.056977987 CET | 1.1.1.1 | 192.168.2.7 | 0xf8fb | No error (0) | 23.55.153.106 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:18.602966070 CET | 1.1.1.1 | 192.168.2.7 | 0x642e | No error (0) | 104.21.66.86 | A (IP address) | IN (0x0001) | false | ||
Dec 18, 2024 11:40:18.602966070 CET | 1.1.1.1 | 192.168.2.7 | 0x642e | No error (0) | 172.67.157.254 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49700 | 104.131.68.180 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:14 UTC | 264 | OUT | |
2024-12-18 10:40:14 UTC | 8 | OUT | |
2024-12-18 10:40:14 UTC | 94 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.7 | 49701 | 23.55.153.106 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:17 UTC | 219 | OUT | |
2024-12-18 10:40:18 UTC | 1905 | IN | |
2024-12-18 10:40:18 UTC | 14479 | IN | |
2024-12-18 10:40:18 UTC | 10097 | IN | |
2024-12-18 10:40:18 UTC | 10545 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.7 | 49702 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:19 UTC | 262 | OUT | |
2024-12-18 10:40:19 UTC | 8 | OUT | |
2024-12-18 10:40:20 UTC | 1030 | IN | |
2024-12-18 10:40:20 UTC | 7 | IN | |
2024-12-18 10:40:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.7 | 49704 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:22 UTC | 263 | OUT | |
2024-12-18 10:40:22 UTC | 54 | OUT | |
2024-12-18 10:40:22 UTC | 1038 | IN | |
2024-12-18 10:40:22 UTC | 331 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 291 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN | |
2024-12-18 10:40:22 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.7 | 49710 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:24 UTC | 281 | OUT | |
2024-12-18 10:40:24 UTC | 12851 | OUT | |
2024-12-18 10:40:25 UTC | 1038 | IN | |
2024-12-18 10:40:25 UTC | 20 | IN | |
2024-12-18 10:40:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.7 | 49716 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:26 UTC | 281 | OUT | |
2024-12-18 10:40:26 UTC | 15083 | OUT | |
2024-12-18 10:40:27 UTC | 1048 | IN | |
2024-12-18 10:40:27 UTC | 20 | IN | |
2024-12-18 10:40:27 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.7 | 49723 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:29 UTC | 281 | OUT | |
2024-12-18 10:40:29 UTC | 15331 | OUT | |
2024-12-18 10:40:29 UTC | 5077 | OUT | |
2024-12-18 10:40:29 UTC | 1041 | IN | |
2024-12-18 10:40:29 UTC | 20 | IN | |
2024-12-18 10:40:29 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.7 | 49730 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:31 UTC | 280 | OUT | |
2024-12-18 10:40:31 UTC | 1229 | OUT | |
2024-12-18 10:40:32 UTC | 1035 | IN | |
2024-12-18 10:40:32 UTC | 20 | IN | |
2024-12-18 10:40:32 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.7 | 49742 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:34 UTC | 282 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:34 UTC | 15331 | OUT | |
2024-12-18 10:40:36 UTC | 1040 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.7 | 49747 | 104.21.66.86 | 443 | 1412 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 10:40:37 UTC | 263 | OUT | |
2024-12-18 10:40:37 UTC | 89 | OUT | |
2024-12-18 10:40:38 UTC | 1042 | IN | |
2024-12-18 10:40:38 UTC | 54 | IN | |
2024-12-18 10:40:38 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 4 |
Start time: | 05:40:09 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\5_6253708004881862888.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xae0000 |
File size: | 319'488 bytes |
MD5 hash: | 62DAD59C8A4BF1E860671C00D12D6BAE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 05:40:09 |
Start date: | 18/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff75da10000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 05:40:10 |
Start date: | 18/12/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9b0000 |
File size: | 65'440 bytes |
MD5 hash: | 0D5DF43AF2916F47D00C1573797C1A13 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | high |
Has exited: | true |
Target ID: | 14 |
Start time: | 07:22:01 |
Start date: | 18/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf80000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 45% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 28% |
Total number of Nodes: | 25 |
Total number of Limit Nodes: | 1 |
Graph
Callgraph
Function 02F7217D Relevance: 42.3, APIs: 10, Strings: 14, Instructions: 282threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013E0AD7 Relevance: 1.8, APIs: 1, Instructions: 269COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 013E04B0 Relevance: 1.6, APIs: 1, Instructions: 56COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 57.7% |
Total number of Nodes: | 352 |
Total number of Limit Nodes: | 36 |
Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041434A Relevance: 20.8, Strings: 16, Instructions: 780COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040A670 Relevance: 20.4, Strings: 16, Instructions: 379COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040B9F0 Relevance: 11.9, Strings: 9, Instructions: 606COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043D6A2 Relevance: 5.8, Strings: 4, Instructions: 780COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041F860 Relevance: 5.3, Strings: 4, Instructions: 306COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043DC30 Relevance: 3.1, Strings: 2, Instructions: 617COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040EC7D Relevance: 3.0, Strings: 2, Instructions: 507COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041F420 Relevance: 1.6, Strings: 1, Instructions: 384COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00437570 Relevance: 1.6, APIs: 1, Instructions: 82comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043D1C0 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00437160 Relevance: 1.5, Strings: 1, Instructions: 254COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041A1CA Relevance: 1.5, Strings: 1, Instructions: 235COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00415F90 Relevance: 1.4, Strings: 1, Instructions: 195COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043FBA0 Relevance: .3, Instructions: 268COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00429C3F Relevance: .2, Instructions: 172COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00437947 Relevance: 8.9, APIs: 4, Strings: 1, Instructions: 183memoryCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00409D50 Relevance: 4.5, APIs: 3, Instructions: 28COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043D0E0 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 76memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043B460 Relevance: 1.6, APIs: 1, Instructions: 79memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043769A Relevance: 1.6, APIs: 1, Instructions: 60memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A3CB Relevance: 1.5, APIs: 1, Instructions: 19COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00431CD6 Relevance: 1.5, APIs: 1, Instructions: 18COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00437745 Relevance: 1.5, APIs: 1, Instructions: 12COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043B452 Relevance: 1.5, APIs: 1, Instructions: 6memoryCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041D042 Relevance: 36.1, Strings: 28, Instructions: 1072COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041D0A0 Relevance: 35.9, Strings: 28, Instructions: 903COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00401000 Relevance: 32.7, Strings: 25, Instructions: 1447COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00414930 Relevance: 15.8, Strings: 12, Instructions: 765COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004029D0 Relevance: 10.6, Strings: 8, Instructions: 617COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00420911 Relevance: 9.0, Strings: 7, Instructions: 298COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041EC8C Relevance: 7.9, Strings: 6, Instructions: 409COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411E0E Relevance: 6.8, Strings: 5, Instructions: 548COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004217C0 Relevance: 6.6, Strings: 5, Instructions: 400COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411E30 Relevance: 5.5, Strings: 4, Instructions: 529COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00421E0D Relevance: 5.4, Strings: 4, Instructions: 381COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00411D2E Relevance: 5.1, Strings: 4, Instructions: 147COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004121A8 Relevance: 4.2, Strings: 3, Instructions: 478COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004127AA Relevance: 4.2, Strings: 3, Instructions: 459COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042EE34 Relevance: 4.2, APIs: 1, Strings: 1, Instructions: 703memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042FAD0 Relevance: 4.2, APIs: 1, Strings: 1, Instructions: 701memoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00405880 Relevance: 4.2, Strings: 3, Instructions: 405COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00406280 Relevance: 3.3, Strings: 2, Instructions: 810COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042CF2A Relevance: 3.3, APIs: 2, Instructions: 283COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430EA1 Relevance: 3.2, APIs: 2, Instructions: 240COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042DC2A Relevance: 3.2, APIs: 2, Instructions: 203COMMON
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041B360 Relevance: 2.9, Strings: 2, Instructions: 447COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043E2BF Relevance: 2.9, Strings: 2, Instructions: 387COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410511 Relevance: 2.9, Strings: 2, Instructions: 356COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00410AED Relevance: 1.8, Strings: 1, Instructions: 537COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00430654 Relevance: 1.8, APIs: 1, Instructions: 267COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041B100 Relevance: 1.7, APIs: 1, Instructions: 242comCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042C9C6 Relevance: 1.7, APIs: 1, Instructions: 221COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A451 Relevance: 1.6, APIs: 1, Instructions: 138COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00415A30 Relevance: 1.6, Strings: 1, Instructions: 385COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042D911 Relevance: 1.6, APIs: 1, Instructions: 131COMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00431DE3 Relevance: 1.6, Strings: 1, Instructions: 354COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004117E0 Relevance: 1.6, Strings: 1, Instructions: 304COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0041182A Relevance: 1.5, Strings: 1, Instructions: 293COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422AC2 Relevance: 1.5, Strings: 1, Instructions: 281COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00407620 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00423DB0 Relevance: 1.5, Strings: 1, Instructions: 236COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00418666 Relevance: 1.5, Strings: 1, Instructions: 233COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402733 Relevance: 1.5, Strings: 1, Instructions: 230COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043E8C2 Relevance: 1.5, Strings: 1, Instructions: 226COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00402709 Relevance: 1.5, Strings: 1, Instructions: 206COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00433B0B Relevance: .9, Instructions: 868COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00408C00 Relevance: .8, Instructions: 772COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404490 Relevance: .7, Instructions: 695COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00406F80 Relevance: .6, Instructions: 596COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404EE0 Relevance: .6, Instructions: 592COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043BDC0 Relevance: .6, Instructions: 574COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004366C0 Relevance: .4, Instructions: 366COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043EC60 Relevance: .4, Instructions: 360COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043162B Relevance: .3, Instructions: 348COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00418BBF Relevance: .3, Instructions: 294COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00420458 Relevance: .3, Instructions: 289COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00440160 Relevance: .3, Instructions: 280COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043FE90 Relevance: .3, Instructions: 270COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043E950 Relevance: .3, Instructions: 253COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042B4A1 Relevance: .2, Instructions: 191COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00434B00 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00436460 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042D483 Relevance: .2, Instructions: 187COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042A020 Relevance: .2, Instructions: 171COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043EF20 Relevance: .2, Instructions: 162COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00422650 Relevance: .2, Instructions: 157COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042548A Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0040D570 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0042527C Relevance: .1, Instructions: 121COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0043B780 Relevance: .1, Instructions: 119COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00413243 Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00432810 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004233D0 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00404130 Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 004134A0 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00439CF0 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|