Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 7272 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: A6689AC573E3667283B840146CB792EE) - cmd.exe (PID: 7356 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy To rture Tort ure.cmd & Torture.cm d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7416 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7424 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7464 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7472 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7512 cmdline:
cmd /c md 195263 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 7528 cmdline:
findstr /V "Metres" Wishlist MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7544 cmdline:
cmd /c cop y /b ..\Wo rst + ..\D odge + ..\ Charitable + ..\Rj + ..\Submit ted + ..\M overs + .. \Independe nt + ..\Vo yuer P MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Material.com (PID: 7560 cmdline:
Material.c om P MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 7980 cmdline:
powershell -exec byp ass -f "C: \Users\use r\AppData\ Local\Temp \HQXY33B0W 5S2WFQR3J5 3KKG.ps1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7988 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 7576 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:32.624228+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:34.603840+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:37.135835+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:39.223546+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:41.324671+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:43.592599+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:45.863810+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:49.405001+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49773 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:51.620391+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49779 | 172.67.75.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:33.372678+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:35.648684+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:50.172211+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49773 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:33.372678+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:35.648684+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:45.868782+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:45.868782+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 21 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Deobfuscate/Decode Files or Information | 2 OS Credential Dumping | 13 File and Directory Discovery | Remote Services | 1 Archive Collected Data | 1 Web Service | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 12 Process Injection | 1 Obfuscated Files or Information | 11 Input Capture | 25 System Information Discovery | Remote Desktop Protocol | 31 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Software Packing | Security Account Manager | 11 Security Software Discovery | SMB/Windows Admin Shares | 11 Input Capture | 11 Encrypted Channel | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 11 Masquerading | LSA Secrets | 121 Virtualization/Sandbox Evasion | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 121 Virtualization/Sandbox Evasion | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 12 Process Injection | DCSync | Remote System Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
57% | Virustotal | Browse | ||
45% | ReversingLabs | Win32.Ransomware.Generic |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
thesishsej.click | 104.21.80.1 | true | true | unknown | |
rentry.co | 172.67.75.40 | true | false | high | |
AsnvOPzrzKjjy.AsnvOPzrzKjjy | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true | unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.75.40 | rentry.co | United States | 13335 | CLOUDFLARENETUS | false | |
104.21.80.1 | thesishsej.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1579283 |
Start date and time: | 2024-12-21 12:55:12 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 56s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@25/27@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 7980 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
06:56:05 | API Interceptor | |
06:56:08 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.75.40 | Get hash | malicious | Unknown | Browse |
| |
104.21.80.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | XWorm | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
rentry.co | Get hash | malicious | XWorm | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Azorult | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, Xmrig | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai, Okiru | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | Azorult | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, Vidar, Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse |
| ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Temp\195263\Material.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Vidar, Xmrig | Browse | |||
Get hash | malicious | LummaC, Amadey, AsyncRAT, LummaC Stealer, XWorm | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse | |||
Get hash | malicious | RHADAMANTHYS | Browse |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.6599547231656377 |
Encrypted: | false |
SSDEEP: | 3:NlllulRlltl:NllU |
MD5: | 2AAC5546A51052C82C51A111418615EB |
SHA1: | 14CFBEF3B3D238893C68F1BD6FE985DACF1953F1 |
SHA-256: | DBBA7151765EDB3661C0B1AD08037C0BDDC43227D2F2E8DDAC33C4A1E7C4151F |
SHA-512: | 1273F4B0365E213134E7FBC3BE45CAC33CB32AB6CED85479905C702F0429A0491A5E9C878E5FEFFA05BB0D1AA7F704949D13DD1DA9FCEB93665F1CC110FB24B8 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 476028 |
Entropy (8bit): | 7.999530741808535 |
Encrypted: | true |
SSDEEP: | 12288:YJ2Ge8RfxOVqy9Yr6qpHsv3XPe1zpua6g6XT73l:581MVqpG+HMXPoMy6D73l |
MD5: | A2DE791D17B7C94E0C653ED763C568C1 |
SHA1: | 0861658F5CAC38188EC51DB9D58F503354D5B140 |
SHA-256: | 8DA8A4ADD81EB53768E203A0F983CD21E62CC4AC5AB1663D6C9270D139C30A8C |
SHA-512: | 8ACAAA593A978005953C8D167F7AFC8E3BDBCCE83A814D515F38A4B8B5830B2E61498EE034635C71F7CF443AE191579F0A4705154E724B7FB88227D31CB90D35 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 36376 |
Entropy (8bit): | 7.1637287485098184 |
Encrypted: | false |
SSDEEP: | 768:19OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GPkjF:1ATGODv7xvTphAiPChgZ2kOE6 |
MD5: | 8EB44B051E6582D738DB9725FEDBB3E9 |
SHA1: | 107945FBEE6F3A6DED971D47798FB212CC0856FC |
SHA-256: | F0D5D669221C61B30A5B2913F02B4E0AA68AC398700F07257E074E2EE58A93A3 |
SHA-512: | A9DFB1FC9C63A63EA44DD330DAAC0D36713922247682193C2D5025A3C1EBA96C1AA7131D09D56FD1A24C72BA585872C10ED97B4314F2BE27C3118F8493FEA757 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 6.573645176384687 |
Encrypted: | false |
SSDEEP: | 1536:i/M26N7oKzYkBvRmLORuCYm9PrpmESvn+pqFqaynB6GMKY99z+ajU1Rjv18fRQL6:qT6pUkBJR8CThpmESv+AqVnBypIbv18h |
MD5: | F00A127DEAEBEC390A588B7C33B7E906 |
SHA1: | F64A4EE38EC101ABCDFBB057CDCB64F67516E5D5 |
SHA-256: | C3970474B898F7FB34A24AC231ADCB49F8B2044567133E991EBD677C5791023D |
SHA-512: | D16CFBCD58CCF8DA49D5C87A737196C84D2B5B92411C036C62B77211EE96125C33E472B67CCFE4DE4E4C4276785F65CB1F35ACC152E558F53401C084A0E9695F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 134144 |
Entropy (8bit): | 6.424505952693105 |
Encrypted: | false |
SSDEEP: | 3072:whnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz4:whnvO5bLezWWt/Dd314V14ZgP0JaAOz4 |
MD5: | 2A7E6D39E439AEBBFC121B4EFBCBC96C |
SHA1: | 204920D9FCED40D04CC7F7EE101BA384C7EFBBB1 |
SHA-256: | CAE4DE2022B5BD53F75BD18BBA0658D725696CA6098AC4A4C33C8F8FC8F552FC |
SHA-512: | 2F1172DE73DF6C90D07304F5A01C28D57B9E65A8A44F0B416C37047B18BE23424210CACCBDB728399F62333472D93DB270EA954A64D31AA4710001601349FEBF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 53248 |
Entropy (8bit): | 7.996341695063307 |
Encrypted: | true |
SSDEEP: | 1536:By9j44DstxVUqZZY+C9Hka07rJxYykTyG:4S4YRyriX42G |
MD5: | 9CF68146DA670B09E482DDE50FDDFF89 |
SHA1: | 5248D83173CED4AEB62C2CFE49F209464022B363 |
SHA-256: | DBACA041388EB9A94255978769B837CF143EEB7AF551207E170D08512E24B51C |
SHA-512: | D740F56AB1A30573DF37F1A2AE5344EDA335FE21A459E4B0005D9EC18F7535486B031D91C90DDD53658EBBDFA3331846738364A36FB3152C2D33688CF6722B2C |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 7.99708377553774 |
Encrypted: | true |
SSDEEP: | 1536:D8sqVG49BAQo4n+CHKqx9GvR+dVEMGMPyj/9Pv50:ozwa2YHKy9uuvPyj/1q |
MD5: | 62AF9BE8CE2D85BAD1E7629AAE627E11 |
SHA1: | 17AEA74E3AD32ACDDF59BEC221B5E7BF2BE2B9D3 |
SHA-256: | 8ABC6F006E0877FEBD5848DB46B2FCC3C471E0E86533EAB9B05C7BAFF2E1C074 |
SHA-512: | 95F8741AE18B71647F178EA2481963F9C29400A68734B6FF0CB0225966B60F3DF7B90E6BFF60050B7A876D41C3FA4DAE8F31597075D1D729BC4B24483316499E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 5.80321855883085 |
Encrypted: | false |
SSDEEP: | 768:xOWel3EYr8qcDP8WBosd0bHazf0Tye4Ur2+9BGmv:x5el3EYrDWyu0uZo2+9BGmv |
MD5: | E821D1CD94534760F7CBDE73CE524CB0 |
SHA1: | 3734812F40EB45CDEB5901C506FCE3B5438FAB5E |
SHA-256: | 17F424FA39A47815C32043C2129F4AE1FDAC117DF6ADE9C9D993620FEDA005BF |
SHA-512: | 8AADC195F3D2221F27B64C546C446A0FFF04B03BB34186A1499E69A75C129A863F946DC17A8E9D7DC1533F1FB64C3355E79809CE750DAED2FD15482E1FB8D57E |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 73728 |
Entropy (8bit): | 5.6449350438690225 |
Encrypted: | false |
SSDEEP: | 768:nKPDvFQC7Vkr5M4INduPbOU7aI4kCD9vmPukxhSaAwuXc/mex/o:n8QuklMBNIimuzaAwusP2 |
MD5: | FEB6D272A9ACD07F35B683DEA244403B |
SHA1: | 83E3C2B27EE92A7752F7B208164C130DBF6B4267 |
SHA-256: | DB6C1E777451F71216DE054CB60C336BF0ACB6FA6F9099DF11835712111EFB54 |
SHA-512: | B514720AE88D756D6A15A777AD92A78842CCF1C15F69EF9EBA7688DA35DB73E7BA8A966093BE98B82287BD9BEF99F73966D0609AC72576AD62AAC896EE262911 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 89088 |
Entropy (8bit): | 6.692223471403054 |
Encrypted: | false |
SSDEEP: | 1536:eFrbCyI7P4Cxi8q0vQEcmFdni8yDGVFE5gOHu1CwCMIBZwneAJu7QnswIPumV3Bq:eU4CE0Imbi80PtCZEMnVIPPBq |
MD5: | D28FA56766276D25F2874070641DE604 |
SHA1: | 9220D7ADF3EE109E206906D43A5E4556CA26E640 |
SHA-256: | 5545F446EE75282F17EE417A0FA9475B8FC2280DCC8088CB9BDA309718F27127 |
SHA-512: | 03B5C3CCF639F3BC0FBB607B297BE51493CC4CEE19525295A2A80AC72AD7747E92E5662891344A8417C00E961F39E6B3E63F5CA358E33D47141BEB4FA4439583 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 145408 |
Entropy (8bit): | 6.708696420472282 |
Encrypted: | false |
SSDEEP: | 3072:qT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2u5hVOoQ7tR:c/sZ7HS3zcNPj0nEo3tb2jz |
MD5: | 7CF76E56BA81A31BF28A1C1E1CAD321F |
SHA1: | 778DCAFAC00CE1708426FD7E2DCD3AF037770069 |
SHA-256: | CE5B12DBDB008261E99F90AB28426EA012AD4859F0F7DE3BD784B00DFD9A4210 |
SHA-512: | 7B2917D715EAA1896E009C81C7E4682E08E075F5D768F789846B7C67D414149DE776BF165AE88E61D487737E0EEAA625CF1F3D8B6A2431038089C572DE4AA816 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Temp\195263\Material.com |
File Type: | |
Category: | dropped |
Size (bytes): | 5659 |
Entropy (8bit): | 5.043036166545258 |
Encrypted: | false |
SSDEEP: | 96:5puA5jKEcXrj7uDQgzss4x3pBxu01nx/ICu:5p9pcXr2DFzh4x3pBIGnx/ju |
MD5: | E11F22F29F519232D653E6A64AA75283 |
SHA1: | 1BC26C67512954504BBF0B2EB2F7EE436BB4689E |
SHA-256: | 72CD492F71D390526033108D8632A6F91EE6A5AEED8DAF5EAA7964E6875F3E85 |
SHA-512: | 7DF3A8A9C1C3AA7076309D22FD8E624713ECBAEEDC6B06520952F8C11889C6747404CBDA4EBE71CF8E56B5AFA6302428B4BCE6CCD99A1701092C20391EEB54A3 |
Malicious: | true |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 54272 |
Entropy (8bit): | 7.996140585570733 |
Encrypted: | true |
SSDEEP: | 1536:epUkjDAR0p8QEc8Vva6POIlVfuua/FY4Apzml2+tg:dkIR0p8JDVvauON6Ta3m |
MD5: | 7B474C7A270B05562F4DF04C00697967 |
SHA1: | D37D08C3153723B1D9DF45832F7DE7042ACB1A97 |
SHA-256: | A4ADAC2E44CA073B3155D620C00D91BFCC07D37F2688E52EBB21C2AF893F06F7 |
SHA-512: | 83DDB175D124569A4A2B2B5C9B1D964731A613CB7F769740E08B7D6662E7CBB141896C41B672EB631B2FE4D3B23FA193D8B7F18403E0FC20CEAE208C95459904 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 83968 |
Entropy (8bit): | 7.997454614133765 |
Encrypted: | true |
SSDEEP: | 1536:gg7/a4TmNF8604KM01/tGlJwt1bvhPAdcepLaV0aTKwQVsaKEFk3e4c6NmT0uap:gg7/gNxN0ZtG0zpPoceJafCgFNqA |
MD5: | 8E85D608FAE0741845AC9CBAAD27CBDF |
SHA1: | 96EC55B730707BCCE31D20324911F793110F5218 |
SHA-256: | 856CE4737706A12A401E3C3F2A391D3126EA21A4E3FDB558E6D71C47758B20EF |
SHA-512: | 4D58A8F2E1E4CFC28255DD971B377417D74139FDA57EC02778038B093074357660314DC79BC49A7B2C075FC2145964A3F244675990F9E30D88A9F5E96A1A6712 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 132096 |
Entropy (8bit): | 6.352940868130163 |
Encrypted: | false |
SSDEEP: | 3072:fZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWfX:fK5vPeDkjGgQaE/loUDtfX |
MD5: | D2EC3B7B64ECC464BE989D7A4C5FA6C0 |
SHA1: | 74976C23FD37ABB28DE6639A20EA48050DB7A3E7 |
SHA-256: | E2846F5FF383C3F4D1DC00429E1FA7D9655D64A620F39028DC8729FA9A4B7E1A |
SHA-512: | D2C0CE03A48F3558125C393E7C1D2F75398FFE913F9C7EB1AC559C1A7273C63477473F5414BE1EF336BD026C3887EE93D793FEA512E3751FC436F517073D3975 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 92160 |
Entropy (8bit): | 6.674682544759914 |
Encrypted: | false |
SSDEEP: | 1536:g/xv5mjKu2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+IH:E5mjccBiqXvpgF4qv+32eOyKODOSpQSR |
MD5: | 9B0A6237D6B009B60AF584FCB0A779E9 |
SHA1: | B3D6700145FF46111A6A4D6CB8D22A3C0C7864AD |
SHA-256: | 687822CB7EA81E06BDB331C995DABB02D7C458659894F28F666169B6F36B590C |
SHA-512: | E14979D7D22914D125E2A8517312B509A2FA2BCC3CA854E1BDEC9CAAC2119152B90E16D981524DD95316B20674DEA72F11BD5F36FE6D99767DDEF6935F28F0A4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 69632 |
Entropy (8bit): | 7.997523149088143 |
Encrypted: | true |
SSDEEP: | 1536:ogs238gBr1eOTT/pUiBjElIqkH8v1M7sT2PesmwOObkCqPq:oG5r0OfpUgjEh+2M7swtBqS |
MD5: | 777214E53991EAA7AA64D36777A13498 |
SHA1: | 7B7D76947552A87141F326D12C524F8019F0FCCC |
SHA-256: | 0CFA11D3CAF030F1887EDAF88CCBCC9FB54C08E63C6ECD9E43CF52EA500EDF2F |
SHA-512: | A1F372CC27631C579CD2027C383FA95873E606BBE0AB42C68A8230D082192999A2F73739083E1C72C0E040CB488C17B0CF5A4BE5F48C0DE8B446AA61C908E784 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 52224 |
Entropy (8bit): | 7.996610227008203 |
Encrypted: | true |
SSDEEP: | 768:108+LGj0uA25iDQxJZM9+MSAUBqZM9SodvpGdlVCBBhuxFKfeGWs:WBbuF50QxJZ06AU8+weUlMhux4fqs |
MD5: | B9D6D227908B29023724E523B75CD1AB |
SHA1: | A835D122C81B003E0EF133BE06F5F1CFD702C835 |
SHA-256: | 0E55FC7472B431BB9FE72E8F7ADB70CA7997A256E24BFF1BF6B5D822D4A2F00A |
SHA-512: | 2E1F44E2D8D9C3B765654D2F082398D77A223DDD7A5E6F5D8CBB163085AAA7D44D61C096E1E280156340A6FB787E8492AD2A8BE035E1D2691D5CA10EE6A71FBD |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19272 |
Entropy (8bit): | 5.1222401506439414 |
Encrypted: | false |
SSDEEP: | 384:uD7x3rQFpAxstmXu8qoo64t8b1Iposlg4sC2LNOsRT5tpKs9VrJMrNjYjppBOvJ:WUHAmm+1oX4o6GksC2LBTvp3Vr4JeXs |
MD5: | C0A35C582407BB23F2D3CE4C5C423F6D |
SHA1: | CE4BE84B1B25F65030B613A294392173F1566E13 |
SHA-256: | 8D4EC9E7457F16F78746E68287780930F5714B62C76B1B040D296E0461F561AD |
SHA-512: | 788CFE8D6864E33E607AF1FF5FC2A3C2F65DFFCB34E4973030DFD790779EC7166462D7BEE80A9E65C627F6AEFA08E8FA7A55CA0A214D4BC6A7C327B84B29FA59 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 19272 |
Entropy (8bit): | 5.1222401506439414 |
Encrypted: | false |
SSDEEP: | 384:uD7x3rQFpAxstmXu8qoo64t8b1Iposlg4sC2LNOsRT5tpKs9VrJMrNjYjppBOvJ:WUHAmm+1oX4o6GksC2LBTvp3Vr4JeXs |
MD5: | C0A35C582407BB23F2D3CE4C5C423F6D |
SHA1: | CE4BE84B1B25F65030B613A294392173F1566E13 |
SHA-256: | 8D4EC9E7457F16F78746E68287780930F5714B62C76B1B040D296E0461F561AD |
SHA-512: | 788CFE8D6864E33E607AF1FF5FC2A3C2F65DFFCB34E4973030DFD790779EC7166462D7BEE80A9E65C627F6AEFA08E8FA7A55CA0A214D4BC6A7C327B84B29FA59 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 80896 |
Entropy (8bit): | 4.584101526599607 |
Encrypted: | false |
SSDEEP: | 768:zGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R:qKaj6iTcPAsAhxjgarB |
MD5: | 3E9A9CA978FA6AB59050B01BF741619A |
SHA1: | B5112E06DD6792AB2F95E92B4C9A347B0D6C02DC |
SHA-256: | 464C950A0431CACAEECA9A4FAEDAE12664FE639EB3045B48B78E5AB14DF2B021 |
SHA-512: | 035D59A4413BBBDFE89472F89994E3BA9F744159FD39E9FDDEBD4B02A0642BED1969833FE3EBA347BF5A9BD84739A4A387C2DE62D115317D65933AE7B3EEFF08 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 27516 |
Entropy (8bit): | 7.992535132835953 |
Encrypted: | true |
SSDEEP: | 768:7izOfPd1pKnXn87PR66JJm1Qnc188eg/Mk:7iqdanXcgUJmAcne5k |
MD5: | 989C91EF4A49961FAB2AF1814411A22D |
SHA1: | 6A8B9F32055244C513BC164D1920F5A9DEAEFBA0 |
SHA-256: | 4BD3DE814B233A3AE33A6A87FAF2FA6B996BC9366A33B9D94DB1E8868CD81DC2 |
SHA-512: | F54CC701BBD8EC0D51BBEEC1FB12918D32031CA48301ADEC1C8CBDAE1CBE3E6994A7DCCC277FF568134CC219943BE9D3EFB63F501EF692B9E2AA9776147B3F69 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 582 |
Entropy (8bit): | 4.294984852520094 |
Encrypted: | false |
SSDEEP: | 12:ANyGSG+fCtJfjEvadTfA43k66h1ICdC3v6l:GyGS9PvCA433C+sCK |
MD5: | 95E6145E3B1877A2E1E548794B08DBB2 |
SHA1: | 7DBD85D162E4BF90517BA233F5DE7A55955F0003 |
SHA-256: | 746AFC54A619C7D8933AF6E680866B583F1C3F088C1270A3C11992A99B5DB31A |
SHA-512: | B6CBBC5CD0D95444DB8A25994B823E3746D5EE144BAC8EA6676BDE386CA4EB1B73EA6AC1F4F029FBCE71871124E2AC64319298868BEE7929DD7EE080C9CE723F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 72704 |
Entropy (8bit): | 7.9972426853151255 |
Encrypted: | true |
SSDEEP: | 1536:OLd4apxr9dGRV5HJ7bOI2NH07kocGnAyiEX5/aD6be4lhofD7y+Cl5kOIGq:OL17GvIJ07GByiu8W9hofC+ClaOS |
MD5: | E78CB5A46C8438430E301F866421C893 |
SHA1: | 8392BE2AD316E05D3079F86277CC791E9E7C99F5 |
SHA-256: | BE7C2819CFA6F533AB859A73D4844E34482C775538241596F50052A2DC4AB3A7 |
SHA-512: | 4C3226CB605C18A557CA37ED1159CD04FF99B2144D95C92F6ACA5D255848547C87E60EFD4DCCCFE4FBE099D6870D9DF7FD7D605B4088042407454CFDD14DB5F6 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.979633962848449 |
TrID: |
|
File name: | Setup.exe |
File size: | 1'390'302 bytes |
MD5: | a6689ac573e3667283b840146cb792ee |
SHA1: | 8e77c0771a4763d16772b902c5d02d0ce8919352 |
SHA256: | 9f95bd935ada8459dcd4a6b37a40ebad39c2c7ad024959cb73c0ba6bc814e26a |
SHA512: | a40a1c59efcf0c264e72699ca5c848e191f4980794aa9461049b0a828f0d8342198ccf510cd38e12974166fe8b616018a257234bd41162e28fe0e342f3c4919d |
SSDEEP: | 24576:FfU/I7mYPDm2rva7uPLbNyPeMR60vus56OdqN+G7FrzqPoQoNF81nQwT:MIaYhrnceU56OdqNR5ooQoKT |
TLSH: | 83552342AEDD14E9ECF95A31BC710A4186B7B90AAFB4C55F51C5C99C3B21F12007E72E |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | fed2c6f6d6d29081 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | EDBF6A7F5C5815E14E4F7B3733618DB1 |
Thumbprint SHA-1: | 8EA890F9D0A72FAE54FD5C745426C638F478B8AA |
Thumbprint SHA-256: | 2F18EF0DB35F7A93022BE3F0F3A433B640445E233273C8F3BB1130D691EE3A45 |
Serial: | 03EC8EB325C4692D4082A37C344B45CB |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007F997D0A7ECBh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007F997D0A7BADh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007F997D0A7B9Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007F997D0A549Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007F997D0A7871h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F997D0A5523h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F997D0A549Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x550ea | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1517ee | 0x1ef0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x550ea | 0x55200 | ace837849c76e78c8b3a8164fb627ce6 | False | 0.9890470126651982 | data | 7.948025140333388 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x156000 | 0xfd6 | 0x1000 | a62ed7a25a40bf5f9e0859ec50028cd7 | False | 0.597412109375 | data | 5.576401608079491 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100220 | 0x4dd37 | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.996116383028782 |
RT_ICON | 0x14df58 | 0x566f | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.000723098476974 |
RT_ICON | 0x1535c8 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.7226775956284153 |
RT_ICON | 0x1546f0 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.8812056737588653 |
RT_DIALOG | 0x154b58 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x154c58 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x154d74 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x154dd4 | 0x3e | data | English | United States | 0.8387096774193549 |
RT_MANIFEST | 0x154e14 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-21T12:56:32.624228+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:33.372678+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:33.372678+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:34.603840+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:35.648684+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:35.648684+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:37.135835+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:39.223546+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:41.324671+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:43.592599+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:45.863810+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:45.868782+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:45.868782+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:49.405001+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49773 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:50.172211+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49773 | 104.21.80.1 | 443 | TCP |
2024-12-21T12:56:51.620391+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49779 | 172.67.75.40 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 12:56:31.397892952 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:31.397937059 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:31.402196884 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:31.403383017 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:31.403395891 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:32.624119043 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:32.624228001 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:32.627739906 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:32.627748966 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:32.628159046 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:32.679177999 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:32.691219091 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:32.691257954 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:32.691422939 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.372683048 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.372821093 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.372888088 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.375334024 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.375354052 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.375375032 CET | 49726 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.375380993 CET | 443 | 49726 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.382328033 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.382370949 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:33.382457972 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.382726908 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:33.382736921 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:34.603751898 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:34.603840113 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:34.607188940 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:34.607198954 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:34.607544899 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:34.611577988 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:34.611634970 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:34.611711979 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.648776054 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.648905039 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.649022102 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.649051905 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.649070024 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.649113894 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.649122000 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.649246931 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.649296045 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.649302959 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.657000065 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.657054901 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.657061100 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.665179014 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.665234089 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.665240049 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.710552931 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.710557938 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.757422924 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.768435955 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.819927931 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.819941044 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.844366074 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.844445944 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.844456911 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.844686031 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.844753981 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.844862938 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.844880104 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.844892025 CET | 49732 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.844897032 CET | 443 | 49732 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.906234026 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.906338930 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:35.906455040 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.906740904 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:35.906793118 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.135730028 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.135834932 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.137047052 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.137087107 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.137938976 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.140691042 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.140872955 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.140924931 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.987277985 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.987402916 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:37.987473011 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.987675905 CET | 49738 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:37.987699986 CET | 443 | 49738 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:38.007503986 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:38.007553101 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:38.007637978 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:38.007913113 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:38.007925987 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:39.223309994 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:39.223546028 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:39.224709034 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:39.224720001 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:39.225752115 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:39.226877928 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:39.227026939 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:39.227067947 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:39.227125883 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:39.267333984 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:40.017411947 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:40.017662048 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:40.017730951 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:40.017868042 CET | 49744 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:40.017889023 CET | 443 | 49744 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:40.101831913 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:40.101883888 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:40.101974010 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:40.102231979 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:40.102248907 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:41.324584007 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:41.324671030 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:41.325841904 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:41.325856924 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:41.326875925 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:41.328073025 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:41.328248024 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:41.328282118 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:41.328341007 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:41.328351974 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:42.279148102 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:42.279405117 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:42.279474020 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:42.279680014 CET | 49750 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:42.279695034 CET | 443 | 49750 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:42.373555899 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:42.373625994 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:42.373724937 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:42.374036074 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:42.374059916 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:43.592221022 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:43.592598915 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:43.593699932 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:43.593708038 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:43.594477892 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:43.595709085 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:43.595846891 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:43.595853090 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:44.349361897 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:44.349478960 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:44.349544048 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:44.349668026 CET | 49756 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:44.349689007 CET | 443 | 49756 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:44.641695976 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:44.641726017 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:44.641808987 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:44.642131090 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:44.642142057 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.863609076 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.863810062 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.865220070 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.865228891 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.866240025 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.867446899 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868143082 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868180990 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.868289948 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868321896 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.868432045 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868505955 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.868638992 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868664980 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.868810892 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.868837118 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.868992090 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.869019032 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.869030952 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.869185925 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.869223118 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.911382914 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.911644936 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.911691904 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.911708117 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.955379009 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:45.955585003 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.955622911 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:45.955656052 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:46.003339052 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:46.003449917 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:46.047377110 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:46.230891943 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:48.182893991 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:48.183135033 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:48.183212042 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:48.183326960 CET | 49762 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:48.183345079 CET | 443 | 49762 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:48.186800957 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:48.186841965 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:48.186929941 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:48.187278986 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:48.187290907 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:49.404800892 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:49.405000925 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:49.406176090 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:49.406184912 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:49.407018900 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:49.408602953 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:49.408629894 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:49.408690929 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.172214985 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.172486067 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.172735929 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:50.173010111 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:50.173031092 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.173051119 CET | 49773 | 443 | 192.168.2.5 | 104.21.80.1 |
Dec 21, 2024 12:56:50.173055887 CET | 443 | 49773 | 104.21.80.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.395117998 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:50.395219088 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:50.395350933 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:50.395680904 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:50.395718098 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:51.620280027 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:51.620390892 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:51.621963024 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:51.621980906 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:51.622473955 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:51.623482943 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:51.671329021 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400285006 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400417089 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400499105 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400563955 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:52.400588036 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400616884 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400674105 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:52.400902987 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.400965929 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:52.401221991 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:52.401221991 CET | 49779 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 21, 2024 12:56:52.401267052 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Dec 21, 2024 12:56:52.401293039 CET | 443 | 49779 | 172.67.75.40 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 21, 2024 12:56:09.530791044 CET | 64977 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 12:56:09.751750946 CET | 53 | 64977 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 12:56:31.017309904 CET | 53623 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 12:56:31.390687943 CET | 53 | 53623 | 1.1.1.1 | 192.168.2.5 |
Dec 21, 2024 12:56:50.175194025 CET | 65160 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 21, 2024 12:56:50.393764019 CET | 53 | 65160 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 21, 2024 12:56:09.530791044 CET | 192.168.2.5 | 1.1.1.1 | 0xff25 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 12:56:31.017309904 CET | 192.168.2.5 | 1.1.1.1 | 0x7d1e | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 12:56:50.175194025 CET | 192.168.2.5 | 1.1.1.1 | 0xf500 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 21, 2024 12:56:09.751750946 CET | 1.1.1.1 | 192.168.2.5 | 0xff25 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:31.390687943 CET | 1.1.1.1 | 192.168.2.5 | 0x7d1e | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:50.393764019 CET | 1.1.1.1 | 192.168.2.5 | 0xf500 | No error (0) | 172.67.75.40 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:50.393764019 CET | 1.1.1.1 | 192.168.2.5 | 0xf500 | No error (0) | 104.26.2.16 | A (IP address) | IN (0x0001) | false | ||
Dec 21, 2024 12:56:50.393764019 CET | 1.1.1.1 | 192.168.2.5 | 0xf500 | No error (0) | 104.26.3.16 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49726 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:32 UTC | 263 | OUT | |
2024-12-21 11:56:32 UTC | 8 | OUT | |
2024-12-21 11:56:33 UTC | 1129 | IN | |
2024-12-21 11:56:33 UTC | 7 | IN | |
2024-12-21 11:56:33 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49732 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:34 UTC | 264 | OUT | |
2024-12-21 11:56:34 UTC | 48 | OUT | |
2024-12-21 11:56:35 UTC | 1126 | IN | |
2024-12-21 11:56:35 UTC | 243 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 185 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN | |
2024-12-21 11:56:35 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49738 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:37 UTC | 281 | OUT | |
2024-12-21 11:56:37 UTC | 12830 | OUT | |
2024-12-21 11:56:37 UTC | 1125 | IN | |
2024-12-21 11:56:37 UTC | 20 | IN | |
2024-12-21 11:56:37 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49744 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:39 UTC | 277 | OUT | |
2024-12-21 11:56:39 UTC | 15048 | OUT | |
2024-12-21 11:56:40 UTC | 1125 | IN | |
2024-12-21 11:56:40 UTC | 20 | IN | |
2024-12-21 11:56:40 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49750 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:41 UTC | 282 | OUT | |
2024-12-21 11:56:41 UTC | 15331 | OUT | |
2024-12-21 11:56:41 UTC | 5237 | OUT | |
2024-12-21 11:56:42 UTC | 1131 | IN | |
2024-12-21 11:56:42 UTC | 20 | IN | |
2024-12-21 11:56:42 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49756 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:43 UTC | 281 | OUT | |
2024-12-21 11:56:43 UTC | 1261 | OUT | |
2024-12-21 11:56:44 UTC | 1124 | IN | |
2024-12-21 11:56:44 UTC | 20 | IN | |
2024-12-21 11:56:44 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49762 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:45 UTC | 273 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:45 UTC | 15331 | OUT | |
2024-12-21 11:56:48 UTC | 1123 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49773 | 104.21.80.1 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:49 UTC | 264 | OUT | |
2024-12-21 11:56:49 UTC | 83 | OUT | |
2024-12-21 11:56:50 UTC | 1125 | IN | |
2024-12-21 11:56:50 UTC | 126 | IN | |
2024-12-21 11:56:50 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49779 | 172.67.75.40 | 443 | 7560 | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-21 11:56:51 UTC | 196 | OUT | |
2024-12-21 11:56:52 UTC | 939 | IN | |
2024-12-21 11:56:52 UTC | 430 | IN | |
2024-12-21 11:56:52 UTC | 1369 | IN | |
2024-12-21 11:56:52 UTC | 1369 | IN | |
2024-12-21 11:56:52 UTC | 1369 | IN | |
2024-12-21 11:56:52 UTC | 1130 | IN | |
2024-12-21 11:56:52 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 06:56:04 |
Start date: | 21/12/2024 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'390'302 bytes |
MD5 hash: | A6689AC573E3667283B840146CB792EE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 06:56:05 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 06:56:05 |
Start date: | 21/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 06:56:06 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 06:56:06 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 06:56:07 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xca0000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 06:56:07 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 06:56:07 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 06:56:07 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd30000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 06:56:07 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 06:56:08 |
Start date: | 21/12/2024 |
Path: | C:\Users\user\AppData\Local\Temp\195263\Material.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x420000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 12 |
Start time: | 06:56:08 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x9a0000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 15 |
Start time: | 06:56:51 |
Start date: | 21/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf00000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 16 |
Start time: | 06:56:51 |
Start date: | 21/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 17.5% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 21% |
Total number of Nodes: | 1482 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 15.9, APIs: 6, Strings: 3, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093FA0 Relevance: .5, Instructions: 507COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F1518 Relevance: .2, Instructions: 186COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F1513 Relevance: .1, Instructions: 110COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093A50 Relevance: .1, Instructions: 86COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093A6F Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093A7F Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093010 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03093000 Relevance: .1, Instructions: 67COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FED01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 02FED005 Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0148 Relevance: 11.6, Strings: 9, Instructions: 319COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0DF8 Relevance: 8.9, Strings: 7, Instructions: 121COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0AD0 Relevance: 6.5, Strings: 5, Instructions: 250COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F2880 Relevance: 6.3, Strings: 5, Instructions: 71COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0508 Relevance: 5.3, Strings: 4, Instructions: 253COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F0828 Relevance: 5.2, Strings: 4, Instructions: 233COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076F2C10 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|