Windows
Analysis Report
f86nrrc6.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- f86nrrc6.exe (PID: 7708 cmdline:
"C:\Users\ user\Deskt op\f86nrrc 6.exe" MD5: F2A50F1B081EA3CD4821195676ADACF1)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["nightybinybz.shop", "mutterissuen.shop", "worddosofrm.shop", "moutheventushz.shop", "bakedstusteeb.shop", "conceszustyb.shop", "respectabosiz.shop", "standartedby.shop"], "Build id": "4SD0y4--MAGISTER"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:59.675990+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.7 | 49713 | 104.102.49.254 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:57.110441+0100 | 2057261 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 51130 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:56.877818+0100 | 2057259 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 56562 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:57.649988+0100 | 2057255 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 52122 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:56.207282+0100 | 2057267 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 58173 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:56.648865+0100 | 2057263 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 54338 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:55.695291+0100 | 2057257 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 59373 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:56.430437+0100 | 2057265 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 53191 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:55.986130+0100 | 2057269 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 56157 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:08:00.464093+0100 | 2858666 | 1 | Domain Observed Used for C2 Detected | 192.168.2.7 | 49713 | 104.102.49.254 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: |
Source: | Binary string: |
Source: | Code function: | 4_2_0040FF28 | |
Source: | Code function: | 4_2_00424C70 | |
Source: | Code function: | 4_2_0041102F | |
Source: | Code function: | 4_2_0043FCC0 | |
Source: | Code function: | 4_2_004358F0 | |
Source: | Code function: | 4_2_0043F880 | |
Source: | Code function: | 4_2_0040F0B0 | |
Source: | Code function: | 4_2_00428140 | |
Source: | Code function: | 4_2_00404D50 | |
Source: | Code function: | 4_2_00408960 | |
Source: | Code function: | 4_2_00423DD0 | |
Source: | Code function: | 4_2_0043F9D0 | |
Source: | Code function: | 4_2_00405DE0 | |
Source: | Code function: | 4_2_0040A5F0 | |
Source: | Code function: | 4_2_00438580 | |
Source: | Code function: | 4_2_00411DB0 | |
Source: | Code function: | 4_2_00407210 | |
Source: | Code function: | 4_2_0041DAD0 | |
Source: | Code function: | 4_2_004266F0 | |
Source: | Code function: | 4_2_004266F0 | |
Source: | Code function: | 4_2_00436350 | |
Source: | Code function: | 4_2_00438330 | |
Source: | Code function: | 4_2_00440330 | |
Source: | Code function: | 4_2_004247C0 | |
Source: | Code function: | 4_2_004247C0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: |
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: |
Source: | Code function: | 4_2_00430A30 |
Source: | Code function: | 4_2_0040F560 | |
Source: | Code function: | 4_2_0040805C | |
Source: | Code function: | 4_2_00409C61 | |
Source: | Code function: | 4_2_0040A070 | |
Source: | Code function: | 4_2_00424C70 | |
Source: | Code function: | 4_2_0043FCC0 | |
Source: | Code function: | 4_2_004358F0 | |
Source: | Code function: | 4_2_00436490 | |
Source: | Code function: | 4_2_0040F0B0 | |
Source: | Code function: | 4_2_00434D40 | |
Source: | Code function: | 4_2_00408960 | |
Source: | Code function: | 4_2_0040C170 | |
Source: | Code function: | 4_2_00413D2B | |
Source: | Code function: | 4_2_00405530 | |
Source: | Code function: | 4_2_0040B1D0 | |
Source: | Code function: | 4_2_00423DD0 | |
Source: | Code function: | 4_2_0043F9D0 | |
Source: | Code function: | 4_2_0043E5E0 | |
Source: | Code function: | 4_2_0040A5F0 | |
Source: | Code function: | 4_2_0041FDF0 | |
Source: | Code function: | 4_2_004039B0 | |
Source: | Code function: | 4_2_0040DA20 | |
Source: | Code function: | 4_2_0041D220 | |
Source: | Code function: | 4_2_0040A228 | |
Source: | Code function: | 4_2_004266F0 | |
Source: | Code function: | 4_2_0040DE80 | |
Source: | Code function: | 4_2_00421A80 | |
Source: | Code function: | 4_2_0040AB40 | |
Source: | Code function: | 4_2_00409340 | |
Source: | Code function: | 4_2_00414763 | |
Source: | Code function: | 4_2_00428B00 | |
Source: | Code function: | 4_2_00412322 | |
Source: | Code function: | 4_2_00440330 | |
Source: | Code function: | 4_2_004247C0 | |
Source: | Code function: | 4_2_00411FD0 | |
Source: | Code function: | 4_2_00434FA0 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 4_2_004358F0 |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 4_2_00401972 | |
Source: | Code function: | 4_2_00403939 |
Boot Survival |
---|
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior | ||
Source: | Window searched: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection |
---|
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: | ||
Source: | API/Special instruction interceptor: |
Source: | File opened: | Jump to behavior |
Source: | Special instruction interceptor: |
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior | ||
Source: | Registry key queried: | Jump to behavior |
Source: | API coverage: |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | System information queried: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Anti Debugging |
---|
Source: | Thread information set: | Jump to behavior |
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: | ||
Source: | Open window title or class name: |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 4_2_0043B600 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Key value queried: | Jump to behavior |
Stealing of Sensitive Information |
---|
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 1 PowerShell | 1 DLL Side-Loading | 1 DLL Side-Loading | 33 Virtualization/Sandbox Evasion | 1 Credential API Hooking | 721 Security Software Discovery | Remote Services | 1 Screen Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 33 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 1 Credential API Hooking | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 2 Obfuscated Files or Information | Security Account Manager | 1 Process Discovery | SMB/Windows Admin Shares | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Software Packing | NTDS | 23 System Information Discovery | Distributed Component Object Model | Input Capture | 113 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | Internet Connection Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
71% | ReversingLabs | Win32.Trojan.Lumma |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
steamcommunity.com | 104.102.49.254 | true | false | high | |
nightybinybz.shop | unknown | unknown | true | unknown | |
moutheventushz.shop | unknown | unknown | true | unknown | |
standartedby.shop | unknown | unknown | true | unknown | |
respectabosiz.shop | unknown | unknown | true | unknown | |
conceszustyb.shop | unknown | unknown | true | unknown | |
bakedstusteeb.shop | unknown | unknown | false | high | |
mutterissuen.shop | unknown | unknown | true | unknown | |
worddosofrm.shop | unknown | unknown | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.102.49.254 | steamcommunity.com | United States | 16625 | AKAMAI-ASUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1577529 |
Start date and time: | 2024-12-18 15:06:46 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 21s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | f86nrrc6.exe |
Detection: | MAL |
Classification: | mal100.troj.evad.winEXE@1/0@9/1 |
EGA Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- VT rate limit hit for: f86nrrc6.exe
Time | Type | Description |
---|---|---|
09:07:54 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.102.49.254 | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
steamcommunity.com | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Python Stealer, Amadey, LummaC Stealer, Monster Stealer, Stealc, Vidar | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
AKAMAI-ASUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | WinSearchAbuse | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, RHADAMANTHYS, Xmrig | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
File type: | |
Entropy (8bit): | 7.965206863566108 |
TrID: |
|
File name: | f86nrrc6.exe |
File size: | 7'238'808 bytes |
MD5: | f2a50f1b081ea3cd4821195676adacf1 |
SHA1: | f57f61d9e455b0a30399dd36d97234bb6fd12802 |
SHA256: | 9446296c74c2843600e6dccb68316ba93494c7eca4053de766bd237a0ff37279 |
SHA512: | b057bedb7067d3ca91f31152bbf34126cad8d29437b83656118ea5807b4f195a3270a0578f51cb8c961b9212c31c71b758865a1cf74c5b4e0bd99a5ddd2b9a58 |
SSDEEP: | 98304:ISTkuyh2weEjW9a3JXwPhxAL+ikiYDCsPtWgYGI+4IPF6scqr/Api3RixLe7J:IP2D/83iiW2AtWxbm5ApiYxLe7J |
TLSH: | 30763353B650E962F92644B10D72C6B310C5FC499F2085AB71E4BF5F3830BA2C5BAD6E |
File Content Preview: | MZ@.....................................!..L.!Win32 .EXE...$@...PE..L....3%g..........................................@.................................s.n..................................................%............m.................................... |
Icon Hash: | 23f7e7f7f3a9d8f9 |
Entrypoint: | 0x11181af |
Entrypoint Section: | .MPRESS2 |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED |
DLL Characteristics: | TERMINAL_SERVER_AWARE |
Time Stamp: | 0x67253391 [Fri Nov 1 20:01:21 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | a4ee7039994118d7b3bfbdda3544c529 |
Signature Valid: | false |
Signature Issuer: | CN=\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\u2116\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae\xae |
Signature Validation Error: | A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider |
Error Number: | -2146762487 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 831EB4B726CD805171AB232FFF74BEA8 |
Thumbprint SHA-1: | 12E28DDFBBFB19CD577295C60487D94C803AE134 |
Thumbprint SHA-256: | BEB2F607C9CAE270331FEE6340CF406C0D55EEF2EC7FA075E7489CF898872E1A |
Serial: | 4840E0ACC336EAA44231DFA5F426BF8F |
Instruction |
---|
pushad |
call 00007FA1D11DD915h |
pop eax |
add eax, 00000B5Ah |
mov esi, dword ptr [eax] |
add esi, eax |
sub eax, eax |
mov edi, esi |
lodsw |
shl eax, 0Ch |
mov ecx, eax |
push eax |
lodsd |
sub ecx, eax |
add esi, ecx |
mov ecx, eax |
push edi |
push ecx |
dec ecx |
mov al, byte ptr [ecx+edi+06h] |
mov byte ptr [ecx+esi], al |
jne 00007FA1D11DD908h |
sub eax, eax |
lodsb |
mov ecx, eax |
and cl, FFFFFFF0h |
and al, 0Fh |
shl ecx, 0Ch |
mov ch, al |
lodsb |
or ecx, eax |
push ecx |
add cl, ch |
mov ebp, FFFFFD00h |
shl ebp, cl |
pop ecx |
pop eax |
mov ebx, esp |
lea esp, dword ptr [esp+ebp*2-00000E70h] |
push ecx |
sub ecx, ecx |
push ecx |
push ecx |
mov ecx, esp |
push ecx |
mov dx, word ptr [edi] |
shl edx, 0Ch |
push edx |
push edi |
add ecx, 04h |
push ecx |
push eax |
add ecx, 04h |
push esi |
push ecx |
call 00007FA1D11DD973h |
mov esp, ebx |
pop esi |
pop edx |
sub eax, eax |
mov dword ptr [edx+esi], eax |
mov ah, 10h |
sub edx, eax |
sub ecx, ecx |
cmp ecx, edx |
jnc 00007FA1D11DD938h |
mov ebx, ecx |
lodsb |
inc ecx |
and al, FEh |
cmp al, E8h |
jne 00007FA1D11DD904h |
inc ebx |
add ecx, 04h |
lodsd |
or eax, eax |
js 00007FA1D11DD918h |
cmp eax, edx |
jnc 00007FA1D11DD8F7h |
jmp 00007FA1D11DD918h |
add eax, ebx |
js 00007FA1D11DD8F1h |
add eax, edx |
sub eax, ebx |
mov dword ptr [esi-04h], eax |
jmp 00007FA1D11DD8E8h |
call 00007FA1D11DD915h |
pop edi |
add edi, FFFFFF4Dh |
mov al, E9h |
stosb |
mov eax, 00000B56h |
stosd |
call 00007FA1D11DD915h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xd18000 | 0x1b0 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xd19000 | 0x4259c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x6de000 | 0x9498 | .MPRESS1 |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xd180b4 | 0x30 | .MPRESS2 |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.MPRESS1 | 0x1000 | 0xd17000 | 0x69aa00 | e117de0f1256fe3665f942812114b350 | unknown | unknown | unknown | unknown | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.MPRESS2 | 0xd18000 | 0xd19 | 0xe00 | 15de060f77f0f2cbc3d456711626c243 | False | 0.5424107142857143 | data | 5.752343724847905 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xd19000 | 0x4259c | 0x42600 | cbd7afe499608cf8356bca4d7c57f86f | False | 0.2385276895009416 | data | 4.250171677922003 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xd19368 | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4096 | English | United States | 0.6292213883677298 |
RT_ICON | 0xd1a438 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9216 | English | United States | 0.5646265560165975 |
RT_ICON | 0xd1ca08 | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16384 | English | United States | 0.5298771846953235 |
RT_ICON | 0xd20c58 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.3135245901639344 |
RT_ICON | 0xd21608 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.3784883720930233 |
RT_ICON | 0xd21ce8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.42021276595744683 |
RT_ICON | 0xd22178 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.2967213114754098 |
RT_ICON | 0xd22b28 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.35872093023255813 |
RT_ICON | 0xd23208 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.38652482269503546 |
RT_ICON | 0xd23698 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.3237704918032787 |
RT_ICON | 0xd24048 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.3930232558139535 |
RT_ICON | 0xd24728 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.43617021276595747 |
RT_ICON | 0xd24bb8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.2819672131147541 |
RT_ICON | 0xd25568 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.34011627906976744 |
RT_ICON | 0xd25c48 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.37677304964539005 |
RT_ICON | 0xd260d8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.2069672131147541 |
RT_ICON | 0xd26a88 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.24941860465116278 |
RT_ICON | 0xd27168 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.3067375886524823 |
RT_ICON | 0xd275f8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.27827868852459015 |
RT_ICON | 0xd27fa8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.3377906976744186 |
RT_ICON | 0xd28688 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.36879432624113473 |
RT_ICON | 0xd28b18 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.2594262295081967 |
RT_ICON | 0xd294c8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.30930232558139537 |
RT_ICON | 0xd29ba8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.33865248226950356 |
RT_ICON | 0xd2a038 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.28688524590163933 |
RT_ICON | 0xd2a9e8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.34069767441860466 |
RT_ICON | 0xd2b0c8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.38475177304964536 |
RT_ICON | 0xd2b558 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.18688524590163935 |
RT_ICON | 0xd2bf08 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.20988372093023255 |
RT_ICON | 0xd2c5e8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.2473404255319149 |
RT_ICON | 0xd2ca78 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.18688524590163935 |
RT_ICON | 0xd2d428 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.20988372093023255 |
RT_ICON | 0xd2db08 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.2473404255319149 |
RT_ICON | 0xd2df98 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.11762295081967213 |
RT_ICON | 0xd2e948 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.14593023255813953 |
RT_ICON | 0xd2f028 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.17375886524822695 |
RT_ICON | 0xd2f4b8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.11762295081967213 |
RT_ICON | 0xd2fe68 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.14593023255813953 |
RT_ICON | 0xd30548 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.17375886524822695 |
RT_ICON | 0xd309d8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1864754098360656 |
RT_ICON | 0xd31388 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.21104651162790697 |
RT_ICON | 0xd31a68 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25177304964539005 |
RT_ICON | 0xd31ef8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.18278688524590164 |
RT_ICON | 0xd328a8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.2052325581395349 |
RT_ICON | 0xd32f88 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.24113475177304963 |
RT_ICON | 0xd33418 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.18278688524590164 |
RT_ICON | 0xd33dc8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.2052325581395349 |
RT_ICON | 0xd344a8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.24113475177304963 |
RT_ICON | 0xd34938 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.11147540983606558 |
RT_ICON | 0xd352e8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.14302325581395348 |
RT_ICON | 0xd359c8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.16578014184397163 |
RT_ICON | 0xd35e58 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.11147540983606558 |
RT_ICON | 0xd36808 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.14302325581395348 |
RT_ICON | 0xd36ee8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.16578014184397163 |
RT_ICON | 0xd37378 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1831967213114754 |
RT_ICON | 0xd37d28 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.2058139534883721 |
RT_ICON | 0xd38408 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.24468085106382978 |
RT_ICON | 0xd38898 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1987704918032787 |
RT_ICON | 0xd39248 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.23837209302325582 |
RT_ICON | 0xd39928 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25975177304964536 |
RT_ICON | 0xd39db8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1987704918032787 |
RT_ICON | 0xd3a768 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.23837209302325582 |
RT_ICON | 0xd3ae48 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25975177304964536 |
RT_ICON | 0xd3b2d8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.12581967213114753 |
RT_ICON | 0xd3bc88 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.15232558139534882 |
RT_ICON | 0xd3c368 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.17819148936170212 |
RT_ICON | 0xd3c7f8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.12581967213114753 |
RT_ICON | 0xd3d1a8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.15232558139534882 |
RT_ICON | 0xd3d888 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.17819148936170212 |
RT_ICON | 0xd3dd18 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1987704918032787 |
RT_ICON | 0xd3e6c8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.2377906976744186 |
RT_ICON | 0xd3eda8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.2632978723404255 |
RT_ICON | 0xd3f238 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.19549180327868854 |
RT_ICON | 0xd3fbe8 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.23488372093023255 |
RT_ICON | 0xd402c8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25620567375886527 |
RT_ICON | 0xd40758 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.19549180327868854 |
RT_ICON | 0xd41108 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.23488372093023255 |
RT_ICON | 0xd417e8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25620567375886527 |
RT_ICON | 0xd41c78 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1221311475409836 |
RT_ICON | 0xd42628 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.1494186046511628 |
RT_ICON | 0xd42d08 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.1702127659574468 |
RT_ICON | 0xd43198 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1221311475409836 |
RT_ICON | 0xd43b48 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.1494186046511628 |
RT_ICON | 0xd44228 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.1702127659574468 |
RT_ICON | 0xd446b8 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | English | United States | 0.1959016393442623 |
RT_ICON | 0xd45068 | 0x6b8 | Device independent bitmap graphic, 20 x 40 x 32, image size 1680 | English | United States | 0.23604651162790696 |
RT_ICON | 0xd45748 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.25975177304964536 |
RT_ICON | 0xd45bd8 | 0xa48 | Device independent bitmap graphic, 26 x 48 x 32, image size 0 | English | United States | 0.04635258358662614 |
RT_ICON | 0xd46648 | 0x708 | Device independent bitmap graphic, 21 x 40 x 32, image size 0 | English | United States | 0.06 |
RT_ICON | 0xd46d78 | 0x4a8 | Device independent bitmap graphic, 17 x 32 x 32, image size 0 | English | United States | 0.07718120805369127 |
RT_ICON | 0xd47248 | 0xa48 | Device independent bitmap graphic, 26 x 48 x 32, image size 0 | English | United States | 0.1344984802431611 |
RT_ICON | 0xd47cb8 | 0x708 | Device independent bitmap graphic, 21 x 40 x 32, image size 0 | English | United States | 0.17722222222222223 |
RT_ICON | 0xd483e8 | 0x4a8 | Device independent bitmap graphic, 17 x 32 x 32, image size 0 | English | United States | 0.21308724832214765 |
RT_ICON | 0xd488b8 | 0xa48 | Device independent bitmap graphic, 26 x 48 x 32, image size 0 | English | United States | 0.16299392097264437 |
RT_ICON | 0xd49328 | 0x708 | Device independent bitmap graphic, 21 x 40 x 32, image size 0 | English | United States | 0.20944444444444443 |
RT_ICON | 0xd49a58 | 0x4a8 | Device independent bitmap graphic, 17 x 32 x 32, image size 0 | English | United States | 0.21476510067114093 |
RT_ICON | 0xd49f28 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 65536 | English | United States | 0.4630160889624985 |
RT_GROUP_ICON | 0xd5a888 | 0x3e | data | English | United States | 0.8225806451612904 |
RT_GROUP_ICON | 0xd5a8f0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5a948 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5a9a0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5a9f8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5aa50 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5aaa8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ab00 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ab58 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5abb0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ac08 | 0x30 | data | English | United States | 0.9375 |
RT_GROUP_ICON | 0xd5ac60 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5acb8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ad10 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ad68 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5adc0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ae18 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5ae70 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5aec8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5af20 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5af78 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5afd0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b028 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b080 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b0d8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b130 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b188 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b1e0 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b238 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b290 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b2e8 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_GROUP_ICON | 0xd5b340 | 0x30 | data | English | United States | 0.9583333333333334 |
RT_MANIFEST | 0xd5b3b0 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
KERNEL32.DLL | GetModuleHandleA, GetProcAddress |
USER32.dll | CloseClipboard |
GDI32.dll | BitBlt |
ole32.dll | CoCreateInstance |
SHELL32.dll | SHEmptyRecycleBinW |
OLEAUT32.dll | SysAllocString |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-18T15:07:55.695291+0100 | 2057257 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (respectabosiz .shop) | 1 | 192.168.2.7 | 59373 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:55.986130+0100 | 2057269 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (worddosofrm .shop) | 1 | 192.168.2.7 | 56157 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:56.207282+0100 | 2057267 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (mutterissuen .shop) | 1 | 192.168.2.7 | 58173 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:56.430437+0100 | 2057265 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (standartedby .shop) | 1 | 192.168.2.7 | 53191 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:56.648865+0100 | 2057263 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nightybinybz .shop) | 1 | 192.168.2.7 | 54338 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:56.877818+0100 | 2057259 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (conceszustyb .shop) | 1 | 192.168.2.7 | 56562 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:57.110441+0100 | 2057261 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (bakedstusteeb .shop) | 1 | 192.168.2.7 | 51130 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:57.649988+0100 | 2057255 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (moutheventushz .shop) | 1 | 192.168.2.7 | 52122 | 1.1.1.1 | 53 | UDP |
2024-12-18T15:07:59.675990+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.7 | 49713 | 104.102.49.254 | 443 | TCP |
2024-12-18T15:08:00.464093+0100 | 2858666 | ETPRO MALWARE Win32/Lumma Stealer Steam Profile Lookup | 1 | 192.168.2.7 | 49713 | 104.102.49.254 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 15:07:58.182627916 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:58.182673931 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:07:58.182742119 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:58.188236952 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:58.188261032 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:07:59.675820112 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:07:59.675990105 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:59.678869963 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:59.678881884 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:07:59.679184914 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:07:59.730422020 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:59.772269011 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:07:59.815342903 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464144945 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464165926 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464205027 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464216948 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464225054 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.464238882 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464251041 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.464257956 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.464287043 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.648063898 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.648125887 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.648149014 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.648155928 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.648224115 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.650434017 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.650470972 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Dec 18, 2024 15:08:00.650490999 CET | 49713 | 443 | 192.168.2.7 | 104.102.49.254 |
Dec 18, 2024 15:08:00.650500059 CET | 443 | 49713 | 104.102.49.254 | 192.168.2.7 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 18, 2024 15:07:55.695291042 CET | 59373 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:55.982157946 CET | 53 | 59373 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:55.986129999 CET | 56157 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:56.203407049 CET | 53 | 56157 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:56.207282066 CET | 58173 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:56.428431988 CET | 53 | 58173 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:56.430437088 CET | 53191 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:56.645627022 CET | 53 | 53191 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:56.648864985 CET | 54338 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:56.870382071 CET | 53 | 54338 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:56.877818108 CET | 56562 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:57.108921051 CET | 53 | 56562 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:57.110440969 CET | 51130 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:57.400774956 CET | 53 | 51130 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:57.649987936 CET | 52122 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:57.870619059 CET | 53 | 52122 | 1.1.1.1 | 192.168.2.7 |
Dec 18, 2024 15:07:57.970858097 CET | 60522 | 53 | 192.168.2.7 | 1.1.1.1 |
Dec 18, 2024 15:07:58.108798027 CET | 53 | 60522 | 1.1.1.1 | 192.168.2.7 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 18, 2024 15:07:55.695291042 CET | 192.168.2.7 | 1.1.1.1 | 0x37a6 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:55.986129999 CET | 192.168.2.7 | 1.1.1.1 | 0x651a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.207282066 CET | 192.168.2.7 | 1.1.1.1 | 0x923c | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.430437088 CET | 192.168.2.7 | 1.1.1.1 | 0xa895 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.648864985 CET | 192.168.2.7 | 1.1.1.1 | 0x6009 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.877818108 CET | 192.168.2.7 | 1.1.1.1 | 0x9716 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.110440969 CET | 192.168.2.7 | 1.1.1.1 | 0x913 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.649987936 CET | 192.168.2.7 | 1.1.1.1 | 0xe43a | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.970858097 CET | 192.168.2.7 | 1.1.1.1 | 0x55e5 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 18, 2024 15:07:55.982157946 CET | 1.1.1.1 | 192.168.2.7 | 0x37a6 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.203407049 CET | 1.1.1.1 | 192.168.2.7 | 0x651a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.428431988 CET | 1.1.1.1 | 192.168.2.7 | 0x923c | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.645627022 CET | 1.1.1.1 | 192.168.2.7 | 0xa895 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:56.870382071 CET | 1.1.1.1 | 192.168.2.7 | 0x6009 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.108921051 CET | 1.1.1.1 | 192.168.2.7 | 0x9716 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.400774956 CET | 1.1.1.1 | 192.168.2.7 | 0x913 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:57.870619059 CET | 1.1.1.1 | 192.168.2.7 | 0xe43a | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 18, 2024 15:07:58.108798027 CET | 1.1.1.1 | 192.168.2.7 | 0x55e5 | No error (0) | 104.102.49.254 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.7 | 49713 | 104.102.49.254 | 443 | 7708 | C:\Users\user\Desktop\f86nrrc6.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-18 14:07:59 UTC | 219 | OUT | |
2024-12-18 14:08:00 UTC | 1905 | IN | |
2024-12-18 14:08:00 UTC | 14479 | IN | |
2024-12-18 14:08:00 UTC | 11186 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 4 |
Start time: | 09:07:43 |
Start date: | 18/12/2024 |
Path: | C:\Users\user\Desktop\f86nrrc6.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 7'238'808 bytes |
MD5 hash: | F2A50F1B081EA3CD4821195676ADACF1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 3.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 72.2% |
Total number of Nodes: | 169 |
Total number of Limit Nodes: | 9 |
Graph
Function 0040F560 Relevance: 7.9, Strings: 6, Instructions: 407COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B600 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040FF28 Relevance: 1.3, Strings: 1, Instructions: 95COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041FDF0 Relevance: 30.6, Strings: 24, Instructions: 601COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004358F0 Relevance: 30.3, APIs: 10, Strings: 7, Instructions: 569memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421A80 Relevance: 11.8, Strings: 9, Instructions: 544COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00423DD0 Relevance: 10.5, Strings: 8, Instructions: 483COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424C70 Relevance: 9.3, Strings: 7, Instructions: 501COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DA20 Relevance: 6.7, Strings: 5, Instructions: 425COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DE80 Relevance: 5.5, Strings: 4, Instructions: 466COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408960 Relevance: 4.1, Strings: 3, Instructions: 391COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040F0B0 Relevance: 4.1, Strings: 3, Instructions: 367COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00430A30 Relevance: 3.2, APIs: 2, Instructions: 155COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E5E0 Relevance: 3.1, Strings: 2, Instructions: 649COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004039B0 Relevance: 2.9, Strings: 2, Instructions: 404COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00413D2B Relevance: 2.1, Strings: 1, Instructions: 802COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405530 Relevance: 1.8, Strings: 1, Instructions: 564COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004266F0 Relevance: 1.6, Strings: 1, Instructions: 358COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AB40 Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D220 Relevance: 1.5, Strings: 1, Instructions: 214COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411DB0 Relevance: 1.4, Strings: 1, Instructions: 145COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F880 Relevance: 1.4, Strings: 1, Instructions: 117COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436350 Relevance: 1.4, Strings: 1, Instructions: 117COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041102F Relevance: 1.3, Strings: 1, Instructions: 13COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C170 Relevance: .8, Instructions: 819COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00412322 Relevance: .7, Instructions: 728COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A5F0 Relevance: .5, Instructions: 459COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040805C Relevance: .4, Instructions: 450COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409340 Relevance: .4, Instructions: 434COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004247C0 Relevance: .4, Instructions: 415COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414763 Relevance: .4, Instructions: 409COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434FA0 Relevance: .4, Instructions: 371COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040B1D0 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00440330 Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FCC0 Relevance: .3, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F9D0 Relevance: .3, Instructions: 265COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00411FD0 Relevance: .3, Instructions: 256COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428B00 Relevance: .2, Instructions: 217COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438330 Relevance: .2, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434D40 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436490 Relevance: .2, Instructions: 176COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE0 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409C61 Relevance: .1, Instructions: 149COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A070 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041DAD0 Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438580 Relevance: .1, Instructions: 114COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00404D50 Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A228 Relevance: .1, Instructions: 77COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428140 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407210 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|