Windows
Analysis Report
RIMz2N1u5y.exe
Overview
General Information
Sample name: | RIMz2N1u5y.exerenamed because original name is a hash value |
Original sample name: | 0afffc327a38bdc6812b51507cacdcbe.exe |
Analysis ID: | 1580856 |
MD5: | 0afffc327a38bdc6812b51507cacdcbe |
SHA1: | be48f9c9d7c0b60207044719d2106e99b1b27f5b |
SHA256: | a35b13603bd53856e24f0cdd8273b5a307d29b671cba0de80b3af85e4db6ed5a |
Tags: | exeuser-abuse_ch |
Infos: | |
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- RIMz2N1u5y.exe (PID: 4040 cmdline:
"C:\Users\ user\Deskt op\RIMz2N1 u5y.exe" MD5: 0AFFFC327A38BDC6812B51507CACDCBE)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["sustainskelet.lat", "rapeflowwj.lat", "crosshuaht.lat", "energyaffai.lat", "discokeyus.lat", "aspecteirs.lat", "grannyejh.lat", "erectystickj.click", "necklacebudi.lat"], "Build id": "yau6Na--8088441378"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 3 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_DelphiSystemParamCount | Detected Delphi use of System.ParamCount() | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:11.096556+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.190867+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:15.669606+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:17.916143+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49734 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:20.350582+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49740 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:22.967197+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49751 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:26.133192+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49757 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:30.912448+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:11.871049+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.972552+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:31.742077+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:11.871049+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:13.972552+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:11.096556+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.190867+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:15.669606+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:17.916143+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49734 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:20.350582+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49740 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:22.967197+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49751 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:26.133192+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49757 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:30.912448+0100 | 2058531 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:09.463786+0100 | 2058530 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 60443 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:16.517651+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_0088A084 | |
Source: | Code function: | 0_2_008A80DC | |
Source: | Code function: | 0_2_008A80DC | |
Source: | Code function: | 0_2_008AF07C | |
Source: | Code function: | 0_2_0087E07F | |
Source: | Code function: | 0_2_0089E1A4 | |
Source: | Code function: | 0_2_0089E1A4 | |
Source: | Code function: | 0_2_008861E8 | |
Source: | Code function: | 0_2_0089412C | |
Source: | Code function: | 0_2_0089C2C9 | |
Source: | Code function: | 0_2_0088B26C | |
Source: | Code function: | 0_2_0088B26C | |
Source: | Code function: | 0_2_0089726C | |
Source: | Code function: | 0_2_0089726C | |
Source: | Code function: | 0_2_0089C261 | |
Source: | Code function: | 0_2_0088E36C | |
Source: | Code function: | 0_2_0088E36C | |
Source: | Code function: | 0_2_0087E434 | |
Source: | Code function: | 0_2_008AA44C | |
Source: | Code function: | 0_2_008965EA | |
Source: | Code function: | 0_2_008AE5EC | |
Source: | Code function: | 0_2_0089A57C | |
Source: | Code function: | 0_2_0089068C | |
Source: | Code function: | 0_2_00898695 | |
Source: | Code function: | 0_2_0087460C | |
Source: | Code function: | 0_2_00899628 | |
Source: | Code function: | 0_2_008A763C | |
Source: | Code function: | 0_2_008A763C | |
Source: | Code function: | 0_2_008A763C | |
Source: | Code function: | 0_2_008A763C | |
Source: | Code function: | 0_2_008747EC | |
Source: | Code function: | 0_2_00888760 | |
Source: | Code function: | 0_2_0088A893 | |
Source: | Code function: | 0_2_008988DC | |
Source: | Code function: | 0_2_008AC8ED | |
Source: | Code function: | 0_2_008988E1 | |
Source: | Code function: | 0_2_0087F827 | |
Source: | Code function: | 0_2_0087F827 | |
Source: | Code function: | 0_2_008AA9AC | |
Source: | Code function: | 0_2_0089C9E1 | |
Source: | Code function: | 0_2_0089C9E1 | |
Source: | Code function: | 0_2_0087AA8C | |
Source: | Code function: | 0_2_0088AAB0 | |
Source: | Code function: | 0_2_008ABA6C | |
Source: | Code function: | 0_2_0087DA6E | |
Source: | Code function: | 0_2_008ACBD6 | |
Source: | Code function: | 0_2_0089AB0C | |
Source: | Code function: | 0_2_008ACB6C | |
Source: | Code function: | 0_2_0088DC86 | |
Source: | Code function: | 0_2_0087ACEC | |
Source: | Code function: | 0_2_00894CFC | |
Source: | Code function: | 0_2_00886DE2 | |
Source: | Code function: | 0_2_008AADFC | |
Source: | Code function: | 0_2_008A4D7C | |
Source: | Code function: | 0_2_0089CD70 | |
Source: | Code function: | 0_2_00890EC8 | |
Source: | Code function: | 0_2_00873EFC | |
Source: | Code function: | 0_2_0089BE62 | |
Source: | Code function: | 0_2_0089BE62 | |
Source: | Code function: | 0_2_0088DF82 | |
Source: | Code function: | 0_2_00878FEC | |
Source: | Code function: | 0_2_00878FEC | |
Source: | Code function: | 0_2_0087BFE8 | |
Source: | Code function: | 0_2_0087FF1D | |
Source: | Code function: | 0_2_0087FEEC | |
Source: | Code function: | 0_2_00895F6C |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Code function: | 0_2_008BF884 |
Source: | Code function: | 0_2_008707CF | |
Source: | Code function: | 0_2_008BF884 | |
Source: | Code function: | 0_2_008A80DC | |
Source: | Code function: | 0_2_0089C0E3 | |
Source: | Code function: | 0_2_0087A0FC | |
Source: | Code function: | 0_2_00870000 | |
Source: | Code function: | 0_2_008BD02C | |
Source: | Code function: | 0_2_008A6039 | |
Source: | Code function: | 0_2_008AF07C | |
Source: | Code function: | 0_2_0087B1CC | |
Source: | Code function: | 0_2_008BC154 | |
Source: | Code function: | 0_2_008A72BC | |
Source: | Code function: | 0_2_0089B20C | |
Source: | Code function: | 0_2_0087820C | |
Source: | Code function: | 0_2_0088B26C | |
Source: | Code function: | 0_2_008AE33C | |
Source: | Code function: | 0_2_0088E36C | |
Source: | Code function: | 0_2_008AA44C | |
Source: | Code function: | 0_2_008A546D | |
Source: | Code function: | 0_2_0088F58C | |
Source: | Code function: | 0_2_008BC58C | |
Source: | Code function: | 0_2_008895C7 | |
Source: | Code function: | 0_2_0088D5F2 | |
Source: | Code function: | 0_2_0087751C | |
Source: | Code function: | 0_2_0087552C | |
Source: | Code function: | 0_2_0087C54C | |
Source: | Code function: | 0_2_0087460C | |
Source: | Code function: | 0_2_008A763C | |
Source: | Code function: | 0_2_00899677 | |
Source: | Code function: | 0_2_008AE70C | |
Source: | Code function: | 0_2_0087680C | |
Source: | Code function: | 0_2_0087F827 | |
Source: | Code function: | 0_2_0089C0E3 | |
Source: | Code function: | 0_2_008AE9AC | |
Source: | Code function: | 0_2_008839DC | |
Source: | Code function: | 0_2_008A29DC | |
Source: | Code function: | 0_2_008779DC | |
Source: | Code function: | 0_2_0089C9E1 | |
Source: | Code function: | 0_2_0089D900 | |
Source: | Code function: | 0_2_0087AA8C | |
Source: | Code function: | 0_2_00889A96 | |
Source: | Code function: | 0_2_008A6AFC | |
Source: | Code function: | 0_2_00892A5C | |
Source: | Code function: | 0_2_0088EBFC | |
Source: | Code function: | 0_2_00874B2C | |
Source: | Code function: | 0_2_008AEC9C | |
Source: | Code function: | 0_2_00888CD7 | |
Source: | Code function: | 0_2_0087ACEC | |
Source: | Code function: | 0_2_00894CFC | |
Source: | Code function: | 0_2_008BBD84 | |
Source: | Code function: | 0_2_00892DBC | |
Source: | Code function: | 0_2_0089FDCA | |
Source: | Code function: | 0_2_008A0DEC | |
Source: | Code function: | 0_2_008AADFC | |
Source: | Code function: | 0_2_008A6D5C | |
Source: | Code function: | 0_2_0089CD70 | |
Source: | Code function: | 0_2_00877D7C | |
Source: | Code function: | 0_2_008BAE90 | |
Source: | Code function: | 0_2_00890EC8 | |
Source: | Code function: | 0_2_0088EECC | |
Source: | Code function: | 0_2_00896ECC | |
Source: | Code function: | 0_2_00875EDC | |
Source: | Code function: | 0_2_00887EF3 | |
Source: | Code function: | 0_2_00878FEC | |
Source: | Code function: | 0_2_00882F7A | |
Source: | Code function: | 0_2_00886F72 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Code function: | 0_2_00870EDF |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | Key opened: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B5CA | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096B4CD | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_0096C43D | |
Source: | Code function: | 0_3_03633EAA | |
Source: | Code function: | 0_3_0363460F | |
Source: | Code function: | 0_2_008AD3FF | |
Source: | Code function: | 0_2_008B2441 |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_008707CF | |
Source: | Code function: | 0_2_00870D8F | |
Source: | Code function: | 0_2_0087113F | |
Source: | Code function: | 0_2_008713DF | |
Source: | Code function: | 0_2_008713DE |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 2 Windows Management Instrumentation | 1 DLL Side-Loading | 1 Process Injection | 11 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 121 Security Software Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 1 Process Injection | LSASS Memory | 11 Virtualization/Sandbox Evasion | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 3 Process Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 File and Directory Discovery | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 22 System Information Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
44% | Virustotal | Browse | ||
61% | ReversingLabs | Win32.Exploit.LummaC |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
erectystickj.click | 172.67.154.166 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
true |
| unknown | |
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false | high | |||
true |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.154.166 | erectystickj.click | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1580856 |
Start date and time: | 2024-12-26 12:07:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 51s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 4 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | RIMz2N1u5y.exerenamed because original name is a hash value |
Original Sample Name: | 0afffc327a38bdc6812b51507cacdcbe.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.42.65.92, 13.107.246.63, 4.245.163.56
- Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
06:08:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.154.166 | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | HTMLPhisher | Browse | |||
Get hash | malicious | HtmlDropper, HTMLPhisher | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
erectystickj.click | Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Vidar | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | CAPTCHA Scam ClickFix | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | MassLogger RAT, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader, FormBook | Browse |
| ||
Get hash | malicious | LummaC, PureLog Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 6.998351449798508 |
TrID: |
|
File name: | RIMz2N1u5y.exe |
File size: | 1'791'344 bytes |
MD5: | 0afffc327a38bdc6812b51507cacdcbe |
SHA1: | be48f9c9d7c0b60207044719d2106e99b1b27f5b |
SHA256: | a35b13603bd53856e24f0cdd8273b5a307d29b671cba0de80b3af85e4db6ed5a |
SHA512: | d06d4750b5947ef93f545746e63526e0d8328232be0f6d2ba402033193d829b3c84d51e8ecd33673246306c7f3102aa1b21aa2380fa1afa34f76376798fbb08d |
SSDEEP: | 24576:6NeOTogDUf5nzEYIrSOCAeiyxuO+wzaSP9/jYpdkp+bGoo5mYwNhmOM+BA0U:6MOEgW5nzEYIrZeiyHagJZ0GNlqhhBm |
TLSH: | FC859E22F6814877E63B2A395C97678D5839BF512F18A80F27E51E4CEF397823C25247 |
File Content Preview: | MZP.....................@...............................................!..L.!..This program must be run under Win32..$7....................................................................................................................................... |
Icon Hash: | daeefcec6470b059 |
Entrypoint: | 0x5241cc |
Entrypoint Section: | CODE |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI |
DLL Characteristics: | |
Time Stamp: | 0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | b428f94ad6be53cc2d17f6f39028fd8b |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | E995C628AAD797E68CAE9D6374BC8ACE |
Thumbprint SHA-1: | CCF8C4F9272D8A25477AF13EC71F97A3027C7319 |
Thumbprint SHA-256: | 13D255CB1919425FC94170917F458E0CEC043372B844B95AA70C9E6B488E1909 |
Serial: | 09D08EBDA06BE07C815EA7AF25EF6875 |
Instruction |
---|
push ebp |
mov ebp, esp |
add esp, FFFFFFF0h |
push ebx |
mov eax, 00523AF4h |
call 00007F74B4E63C04h |
push 0052424Ch |
push FFFFFFFFh |
push 00000000h |
call 00007F74B4E63FB6h |
mov ebx, eax |
test ebx, ebx |
je 00007F74B4F80D56h |
call 00007F74B4E640DBh |
test eax, eax |
jne 00007F74B4F80D4Dh |
mov eax, dword ptr [0052B238h] |
mov eax, dword ptr [eax] |
call 00007F74B4ED501Bh |
mov eax, dword ptr [0052B238h] |
mov eax, dword ptr [eax] |
mov edx, 00524264h |
call 00007F74B4ED4AAEh |
mov ecx, dword ptr [0052B5C4h] |
mov eax, dword ptr [0052B238h] |
mov eax, dword ptr [eax] |
mov edx, dword ptr [0051FEB0h] |
call 00007F74B4ED5012h |
mov eax, dword ptr [0052B238h] |
mov eax, dword ptr [eax] |
call 00007F74B4ED509Ah |
test ebx, ebx |
je 00007F74B4F80D08h |
push ebx |
call 00007F74B4E63F2Ch |
pop ebx |
call 00007F74B4E61402h |
add byte ptr [ecx+6Eh], al |
je 00007F74B4F80D6Bh |
push esp |
jc 00007F74B4F80D63h |
arpl word ptr [ebx+73h], bp |
dec esp |
push ebp |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x136000 | 0x37b6 | .idata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x14f000 | 0x6f400 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x1afa00 | 0x5b70 | .rsrc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x13c000 | 0x12adc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x13b000 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
CODE | 0x1000 | 0x123280 | 0x123400 | 45bc4ac3f1cc7765fe8b8902cb62ebe3 | False | 0.45875134120171673 | data | 6.482800368522281 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
DATA | 0x125000 | 0x6628 | 0x6800 | 8143af87231457316ef639168dc1eace | False | 0.39224008413461536 | data | 4.4751818109925985 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
BSS | 0x12c000 | 0x9995 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.idata | 0x136000 | 0x37b6 | 0x3800 | 7a3a95e47ac9188bde88b3791bb07696 | False | 0.357421875 | data | 4.9930533387998945 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x13a000 | 0x10 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rdata | 0x13b000 | 0x18 | 0x200 | c2d6eaf3284f8ad317554d46e2e2da6b | False | 0.05078125 | data | 0.2069200177871819 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.reloc | 0x13c000 | 0x12adc | 0x12c00 | f6ffe2e684a818ae911ae4b026d07990 | False | 0.541640625 | data | 6.662269937025544 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
.rsrc | 0x14f000 | 0x6f400 | 0x6f400 | 28e2bec88f8bb41d0799fd10dba5f0bd | False | 0.5856982970505618 | data | 7.431820832249136 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_CURSOR | 0x1509a0 | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | German | Germany | 0.3961038961038961 |
RT_CURSOR | 0x150ad4 | 0x134 | data | 0.4642857142857143 | ||
RT_CURSOR | 0x150c08 | 0x134 | data | 0.4805194805194805 | ||
RT_CURSOR | 0x150d3c | 0x134 | data | 0.38311688311688313 | ||
RT_CURSOR | 0x150e70 | 0x134 | data | 0.36038961038961037 | ||
RT_CURSOR | 0x150fa4 | 0x134 | data | 0.4090909090909091 | ||
RT_CURSOR | 0x1510d8 | 0x134 | Targa image data - RGB 64 x 65536 x 1 +32 "\001" | 0.4967532467532468 | ||
RT_CURSOR | 0x15120c | 0x134 | Targa image data 64 x 65536 x 1 +32 "\001" | German | Germany | 0.31493506493506496 |
RT_CURSOR | 0x151340 | 0x134 | data | English | United States | 0.38961038961038963 |
RT_CURSOR | 0x151474 | 0x134 | Targa image data - Map 64 x 65536 x 1 +32 "\001" | 0.38636363636363635 | ||
RT_BITMAP | 0x1515a8 | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x151778 | 0x1e4 | Device independent bitmap graphic, 36 x 19 x 4, image size 380 | 0.46487603305785125 | ||
RT_BITMAP | 0x15195c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.43103448275862066 | ||
RT_BITMAP | 0x151b2c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39870689655172414 | ||
RT_BITMAP | 0x151cfc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.4245689655172414 | ||
RT_BITMAP | 0x151ecc | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5021551724137931 | ||
RT_BITMAP | 0x15209c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5064655172413793 | ||
RT_BITMAP | 0x15226c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x15243c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.5344827586206896 | ||
RT_BITMAP | 0x15260c | 0x1d0 | Device independent bitmap graphic, 36 x 18 x 4, image size 360 | 0.39655172413793105 | ||
RT_BITMAP | 0x1527dc | 0xe8 | Device independent bitmap graphic, 16 x 16 x 4, image size 128 | 0.4870689655172414 | ||
RT_BITMAP | 0x1528c4 | 0x4b8 | Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/m | English | United States | 0.35596026490066224 |
RT_BITMAP | 0x152d7c | 0x4b8 | Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/m | English | United States | 0.3518211920529801 |
RT_BITMAP | 0x153234 | 0x4b8 | Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/m | English | United States | 0.34271523178807944 |
RT_BITMAP | 0x1536ec | 0x4b8 | Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2882 x 2882 px/m | English | United States | 0.3609271523178808 |
RT_BITMAP | 0x153ba4 | 0x4b8 | Device independent bitmap graphic, 12 x 12 x 8, image size 144, resolution 2866 x 2866 px/m | English | United States | 0.36423841059602646 |
RT_BITMAP | 0x15405c | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.32741116751269034 |
RT_BITMAP | 0x154684 | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.33756345177664976 |
RT_BITMAP | 0x154cac | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/m | English | United States | 0.30774111675126903 |
RT_BITMAP | 0x1552d4 | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.39403553299492383 |
RT_BITMAP | 0x1558fc | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2882 x 2882 px/m | English | United States | 0.4346446700507614 |
RT_BITMAP | 0x155f24 | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.32741116751269034 |
RT_BITMAP | 0x15654c | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.3483502538071066 |
RT_BITMAP | 0x156b74 | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/m | English | United States | 0.30710659898477155 |
RT_BITMAP | 0x15719c | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2913 x 2913 px/m | English | United States | 0.33121827411167515 |
RT_BITMAP | 0x1577c4 | 0x628 | Device independent bitmap graphic, 32 x 16 x 8, image size 512, resolution 2898 x 2898 px/m | English | United States | 0.30710659898477155 |
RT_ICON | 0x157dec | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600, resolution 2835 x 2835 px/m | English | United States | 0.5161825726141079 |
RT_DIALOG | 0x15a394 | 0x52 | data | 0.7682926829268293 | ||
RT_STRING | 0x15a3e8 | 0x30c | data | 0.3230769230769231 | ||
RT_STRING | 0x15a6f4 | 0x450 | data | 0.35144927536231885 | ||
RT_STRING | 0x15ab44 | 0x358 | data | 0.37616822429906543 | ||
RT_STRING | 0x15ae9c | 0x404 | data | 0.38715953307393 | ||
RT_STRING | 0x15b2a0 | 0x3f8 | data | 0.3543307086614173 | ||
RT_STRING | 0x15b698 | 0x310 | data | 0.39285714285714285 | ||
RT_STRING | 0x15b9a8 | 0x324 | data | 0.43159203980099503 | ||
RT_STRING | 0x15bccc | 0x3dc | data | 0.4271255060728745 | ||
RT_STRING | 0x15c0a8 | 0x6a4 | data | 0.20705882352941177 | ||
RT_STRING | 0x15c74c | 0x884 | data | 0.13669724770642203 | ||
RT_STRING | 0x15cfd0 | 0x870 | data | 0.13657407407407407 | ||
RT_STRING | 0x15d840 | 0x9bc | data | 0.13964686998394862 | ||
RT_STRING | 0x15e1fc | 0x2b0 | data | 0.373546511627907 | ||
RT_STRING | 0x15e4ac | 0x33c | data | 0.4082125603864734 | ||
RT_STRING | 0x15e7e8 | 0x260 | data | 0.3618421052631579 | ||
RT_STRING | 0x15ea48 | 0x1bc | data | 0.44594594594594594 | ||
RT_STRING | 0x15ec04 | 0x144 | data | 0.4783950617283951 | ||
RT_STRING | 0x15ed48 | 0x11c | data | 0.5598591549295775 | ||
RT_STRING | 0x15ee64 | 0x11c | data | 0.5845070422535211 | ||
RT_STRING | 0x15ef80 | 0x2e0 | data | 0.40217391304347827 | ||
RT_STRING | 0x15f260 | 0x1ac | data | 0.4158878504672897 | ||
RT_STRING | 0x15f40c | 0x140 | StarOffice Gallery theme o, 536901888 objects, 1st u | 0.525 | ||
RT_STRING | 0x15f54c | 0x118 | data | 0.5321428571428571 | ||
RT_STRING | 0x15f664 | 0x298 | data | 0.4578313253012048 | ||
RT_STRING | 0x15f8fc | 0x470 | data | 0.3732394366197183 | ||
RT_STRING | 0x15fd6c | 0x268 | data | 0.4805194805194805 | ||
RT_STRING | 0x15ffd4 | 0x204 | data | 0.36046511627906974 | ||
RT_STRING | 0x1601d8 | 0x10c | data | 0.585820895522388 | ||
RT_STRING | 0x1602e4 | 0x350 | data | 0.43160377358490565 | ||
RT_STRING | 0x160634 | 0x1e8 | data | 0.5061475409836066 | ||
RT_STRING | 0x16081c | 0xec | data | 0.597457627118644 | ||
RT_STRING | 0x160908 | 0x1a8 | data | 0.5 | ||
RT_STRING | 0x160ab0 | 0x2b8 | data | 0.4454022988505747 | ||
RT_STRING | 0x160d68 | 0x3f8 | data | 0.37401574803149606 | ||
RT_STRING | 0x161160 | 0x360 | data | 0.4027777777777778 | ||
RT_STRING | 0x1614c0 | 0x378 | data | 0.3367117117117117 | ||
RT_STRING | 0x161838 | 0x410 | data | 0.3798076923076923 | ||
RT_STRING | 0x161c48 | 0xec | data | 0.4788135593220339 | ||
RT_STRING | 0x161d34 | 0xd0 | data | 0.5673076923076923 | ||
RT_STRING | 0x161e04 | 0x29c | data | 0.4535928143712575 | ||
RT_STRING | 0x1620a0 | 0x3e8 | data | 0.316 | ||
RT_STRING | 0x162488 | 0x374 | data | 0.3766968325791855 | ||
RT_STRING | 0x1627fc | 0x314 | data | 0.3629441624365482 | ||
RT_RCDATA | 0x162b10 | 0x10 | data | 1.5 | ||
RT_RCDATA | 0x162b20 | 0xadc | data | 0.5910071942446044 | ||
RT_RCDATA | 0x1635fc | 0x2d0 | Delphi compiled form 'TframePage1' | 0.6263888888888889 | ||
RT_RCDATA | 0x1638cc | 0x70d | Delphi compiled form 'TframePage2' | 0.4121883656509695 | ||
RT_RCDATA | 0x163fdc | 0x3db | Delphi compiled form 'TframePage3' | 0.5481256332320162 | ||
RT_RCDATA | 0x1643b8 | 0xbe2 | Delphi compiled form 'TframePage4' | 0.23372781065088757 | ||
RT_RCDATA | 0x164f9c | 0x2b4 | Delphi compiled form 'TframePage5' | 0.5722543352601156 | ||
RT_RCDATA | 0x165250 | 0x2ec | Delphi compiled form 'TframePage6' | 0.5628342245989305 | ||
RT_RCDATA | 0x16553c | 0x20d | Delphi compiled form 'TframePage7' | 0.5619047619047619 | ||
RT_RCDATA | 0x16574c | 0x225 | Delphi compiled form 'TfrmClosing' | 0.6193078324225865 | ||
RT_RCDATA | 0x165974 | 0x787 | Delphi compiled form 'TfrmConfigure' | 0.4193046185781007 | ||
RT_RCDATA | 0x1660fc | 0x5355 | Delphi compiled form 'TfrmLUMain' | 0.7868560446256972 | ||
RT_RCDATA | 0x16b454 | 0x76b | Delphi compiled form 'TfrmReport' | 0.4296998420221169 | ||
RT_RCDATA | 0x16bbc0 | 0x12ec | Delphi compiled form 'TRzFrmCustomizeToolbar' | 0.2698183319570603 | ||
RT_GROUP_CURSOR | 0x16ceac | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | German | Germany | 1.25 |
RT_GROUP_CURSOR | 0x16cec0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | German | Germany | 1.3 |
RT_GROUP_CURSOR | 0x16ced4 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States | 1.3 |
RT_GROUP_CURSOR | 0x16cee8 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x16cefc | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.25 | ||
RT_GROUP_CURSOR | 0x16cf10 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x16cf24 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x16cf38 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x16cf4c | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_CURSOR | 0x16cf60 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | 1.3 | ||
RT_GROUP_ICON | 0x16cf74 | 0x14 | data | English | United States | 1.15 |
RT_VERSION | 0x16cf88 | 0x350 | data | English | United States | 0.45047169811320753 |
RT_MANIFEST | 0x16d2d8 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
kernel32.dll | DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, SetCurrentDirectoryA, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCurrentDirectoryA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle |
user32.dll | GetKeyboardType, LoadStringA, MessageBoxA, CharNextA |
advapi32.dll | RegQueryValueExA, RegOpenKeyExA, RegCloseKey |
oleaut32.dll | SysFreeString, SysReAllocStringLen, SysAllocStringLen |
kernel32.dll | TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA |
advapi32.dll | RegSetValueExA, RegQueryValueExW, RegQueryValueExA, RegQueryInfoKeyA, RegOpenKeyExW, RegOpenKeyExA, RegFlushKey, RegEnumValueA, RegCreateKeyExA, RegCreateKeyA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA, LookupAccountNameA, GetUserNameA, AdjustTokenPrivileges |
kernel32.dll | lstrlenW, lstrlenA, lstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, UnmapViewOfFile, TerminateProcess, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, SetCurrentDirectoryA, SetComputerNameA, ResumeThread, ResetEvent, ReadFile, QueryPerformanceFrequency, QueryPerformanceCounter, OpenProcess, MultiByteToWideChar, MulDiv, MoveFileA, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, IsBadReadPtr, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalMemoryStatus, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetWindowsDirectoryA, GetVersionExA, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathA, GetSystemPowerStatus, GetSystemInfo, GetSystemDirectoryA, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetOEMCP, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeThread, GetEnvironmentVariableA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCurrentDirectoryA, GetComputerNameA, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FreeLibrary, FormatMessageA, FindResourceA, FindNextFileA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExpandEnvironmentStringsA, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileA, CreateEventA, CreateDirectoryA, CompareStringA, CloseHandle |
version.dll | VerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA |
gdi32.dll | UnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWinMetaFileBits, SetViewportOrgEx, SetTextColor, SetTextAlign, SetStretchBltMode, SetROP2, SetPixelFormat, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, Polyline, Polygon, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetViewportOrgEx, GetTextMetricsA, GetTextExtentPointA, GetTextExtentPoint32A, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, GdiFlush, ExtTextOutA, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, ChoosePixelFormat, BitBlt |
user32.dll | CreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, TabbedTextOutA, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetSysColors, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetClassLongA, SetCaretPos, SetCaretBlinkTime, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MsgWaitForMultipleObjects, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetTabbedTextExtentA, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDialogBaseUnits, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCaretBlinkTime, GetCapture, GetActiveWindow, FrameRect, FindWindowExA, FindWindowA, FillRect, ExitWindowsEx, EqualRect, EnumWindows, EnumThreadWindows, EnumDisplaySettingsA, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DrawAnimatedRects, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, ChangeDisplaySettingsA, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout |
ole32.dll | IsEqualGUID |
kernel32.dll | Sleep |
oleaut32.dll | SafeArrayPtrOfIndex, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit |
ole32.dll | CreateStreamOnHGlobal, CoTaskMemFree, CoCreateInstance, CoUninitialize, CoInitializeEx, CoInitialize |
oleaut32.dll | CreateErrorInfo, GetErrorInfo, SetErrorInfo, SysFreeString |
comctl32.dll | ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create |
winspool.drv | OpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter |
shell32.dll | Shell_NotifyIconA, ShellExecuteA, SHGetFileInfoA |
shell32.dll | SHGetSpecialFolderPathA, SHGetSpecialFolderLocation, SHGetPathFromIDListA, SHGetMalloc, SHGetDesktopFolder |
gdiplus.dll | GdipGetImagePixelFormat, GdipSetPathGradientPresetBlend, GdipSetPathGradientWrapMode, GdipSetLineGammaCorrection, GdipSetImageAttributesColorKeys, GdipDisposeImageAttributes, GdipCreateImageAttributes, GdipCreateTexture, GdipResetClip, GdipBitmapGetPixel, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipDeleteRegion, GdipCreateRegionPath, GdipCreateRegionRect, GdipSetClipRegion, GdipSetPenDashStyle, GdipGetImageHeight, GdipGetImageWidth, GdipDisposeImage, GdipLoadImageFromStreamICM, GdipLoadImageFromStream, GdipFillPath, GdipDrawLine, GdipDrawRectangle, GdipDrawImageRectRect, GdipDrawImageRect, GdipGetImageRawFormat, GdipDeleteStringFormat, GdipCreateStringFormat, GdipMeasureString, GdipDrawString, GdipDeleteFont, GdipCreateFont, GdipDeleteFontFamily, GdipCreateFontFamilyFromName, GdipFillRectangle, GdipDrawPath, GdipSetTextRenderingHint, GdipGetSmoothingMode, GdipSetSmoothingMode, GdipDeleteGraphics, GdipCreateFromHDC, GdipDeletePen, GdipCreatePen1, GdipGetPathGradientPointCount, GdipSetPathGradientCenterPoint, GdipSetPathGradientSurroundColorsWithCount, GdipSetPathGradientCenterColor, GdipCreatePathGradientFromPath, GdipResetPath, GdipCreateLineBrushFromRectWithAngle, GdipCreateLineBrushFromRect, GdipCreateSolidFill, GdipCreateHatchBrush, GdipDeleteBrush, GdipAddPathEllipse, GdipAddPathArc, GdipAddPathLine, GdipClosePathFigure, GdipDeletePath, GdipCreatePath, GdiplusShutdown, GdiplusStartup, GdipFree, GdipAlloc |
kernel32.dll | GetVersionExA |
wsock32.dll | WSACleanup, WSAStartup, gethostname, gethostbyname, inet_ntoa |
kernel32.dll | SetNamedPipeHandleState, WaitNamedPipeA, GetLastError, CreateFileA, CloseHandle, ReadFile, WriteFile |
wsock32.dll | connect, htons, gethostbyname, inet_addr, socket, WSAStartup, WSACleanup, closesocket, shutdown, select, __WSAFDIsSet, WSAGetLastError, recv, send, ioctlsocket, setsockopt |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
German | Germany | |
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-26T12:08:09.463786+0100 | 2058530 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (erectystickj .click) | 1 | 192.168.2.6 | 60443 | 1.1.1.1 | 53 | UDP |
2024-12-26T12:08:11.096556+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:11.096556+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:11.871049+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:11.871049+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.190867+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.190867+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.972552+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:13.972552+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:15.669606+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:15.669606+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:16.517651+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:17.916143+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49734 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:17.916143+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49734 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:20.350582+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49740 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:20.350582+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49740 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:22.967197+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49751 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:22.967197+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49751 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:26.133192+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49757 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:26.133192+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49757 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:30.912448+0100 | 2058531 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (erectystickj .click in TLS SNI) | 1 | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:30.912448+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
2024-12-26T12:08:31.742077+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 26, 2024 12:08:09.775507927 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:09.775564909 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:09.775687933 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:09.779289007 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:09.779304028 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.096343994 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.096555948 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.099143982 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.099157095 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.099433899 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.144813061 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.150898933 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.150923014 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.151058912 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.871078968 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.871198893 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.871335030 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.874043941 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.874070883 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.874083996 CET | 49713 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.874090910 CET | 443 | 49713 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.885212898 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.885288000 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:11.885373116 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.885725021 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:11.885756016 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.190718889 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.190866947 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.192825079 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.192836046 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.193114042 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.194581985 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.194607019 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.194662094 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972563028 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972618103 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972655058 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972687006 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972728968 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.972750902 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.972764969 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.980627060 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.980659962 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.980727911 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.980735064 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.980811119 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.989044905 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.997560024 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:13.997675896 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:13.997683048 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.051106930 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.092267990 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.144850969 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.144872904 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.182848930 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.183012962 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.183022976 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.186655045 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.186748981 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.186772108 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.186809063 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.187015057 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.187024117 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.187053919 CET | 49719 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.187060118 CET | 443 | 49719 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.354753017 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.354804993 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:14.354897976 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.355221033 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:14.355231047 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:15.669385910 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:15.669605970 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:15.671113968 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:15.671127081 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:15.671422005 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:15.672683954 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:15.672851086 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:15.672882080 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:16.517662048 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:16.517756939 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:16.520349026 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.520349026 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.611402988 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.611454964 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:16.611619949 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.611850023 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.611861944 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:16.820547104 CET | 49725 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:16.820574999 CET | 443 | 49725 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:17.915695906 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:17.916142941 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:17.917896032 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:17.917905092 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:17.918368101 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:17.919924021 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:17.920124054 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:17.920154095 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:17.920238018 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:17.963345051 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:18.816468000 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:18.816580057 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:18.816700935 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:18.817092896 CET | 49734 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:18.817115068 CET | 443 | 49734 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:19.040452003 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:19.040510893 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:19.040656090 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:19.041011095 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:19.041027069 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:20.350471020 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:20.350581884 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:20.352016926 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:20.352027893 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:20.352308035 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:20.353544950 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:20.353688955 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:20.353830099 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:20.353885889 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:20.353892088 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:21.352853060 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:21.352973938 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:21.353048086 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:21.353209019 CET | 49740 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:21.353230000 CET | 443 | 49740 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:21.662970066 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:21.663026094 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:21.663124084 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:21.663482904 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:21.663495064 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:22.967029095 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:22.967196941 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:22.974209070 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:22.974235058 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:22.974528074 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:22.975724936 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:22.975812912 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:22.975820065 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:24.095172882 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:24.095283031 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:24.095448971 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:24.095551014 CET | 49751 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:24.095580101 CET | 443 | 49751 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:24.827625990 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:24.827702999 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:24.827958107 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:24.828279018 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:24.828304052 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.133049011 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.133192062 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.170610905 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.170646906 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.171001911 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.222995996 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.521153927 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.521996975 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522027969 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522130966 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522155046 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522236109 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522289038 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522408962 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522437096 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522603035 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522629976 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522788048 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522814989 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.522825003 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522948027 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.522979975 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.567339897 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.567503929 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.567550898 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.567569971 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.615338087 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.615510941 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.615567923 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.615601063 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.663336039 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.663475037 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.707345963 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.707401037 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:26.707418919 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:26.883018970 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:28.988615990 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:28.988719940 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:28.988833904 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:29.022380114 CET | 49757 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:29.022422075 CET | 443 | 49757 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:29.598977089 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:29.599021912 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:29.599117994 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:29.599498987 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:29.599509954 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:30.908241034 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:30.912447929 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:30.912447929 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:30.912497997 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:30.912767887 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:30.914164066 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:30.914176941 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:30.914227009 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742090940 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742141008 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742228985 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.742244959 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742384911 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742414951 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742423058 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.742429018 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.742461920 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.750361919 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.758785963 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.758825064 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.758867025 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.758888006 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.758932114 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.767400026 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.775449991 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.775516033 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.775527000 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.775600910 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.775790930 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.775810957 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Dec 26, 2024 12:08:31.775830984 CET | 49768 | 443 | 192.168.2.6 | 172.67.154.166 |
Dec 26, 2024 12:08:31.775836945 CET | 443 | 49768 | 172.67.154.166 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 26, 2024 12:08:09.463785887 CET | 60443 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 26, 2024 12:08:09.767463923 CET | 53 | 60443 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 26, 2024 12:08:09.463785887 CET | 192.168.2.6 | 1.1.1.1 | 0xef6d | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 26, 2024 12:08:09.767463923 CET | 1.1.1.1 | 192.168.2.6 | 0xef6d | No error (0) | 172.67.154.166 | A (IP address) | IN (0x0001) | false | ||
Dec 26, 2024 12:08:09.767463923 CET | 1.1.1.1 | 192.168.2.6 | 0xef6d | No error (0) | 104.21.5.142 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49713 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:11 UTC | 265 | OUT | |
2024-12-26 11:08:11 UTC | 8 | OUT | |
2024-12-26 11:08:11 UTC | 1129 | IN | |
2024-12-26 11:08:11 UTC | 7 | IN | |
2024-12-26 11:08:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49719 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:13 UTC | 266 | OUT | |
2024-12-26 11:08:13 UTC | 52 | OUT | |
2024-12-26 11:08:13 UTC | 1135 | IN | |
2024-12-26 11:08:13 UTC | 234 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 269 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN | |
2024-12-26 11:08:13 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49725 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:15 UTC | 284 | OUT | |
2024-12-26 11:08:15 UTC | 12864 | OUT | |
2024-12-26 11:08:16 UTC | 1132 | IN | |
2024-12-26 11:08:16 UTC | 20 | IN | |
2024-12-26 11:08:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49734 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:17 UTC | 281 | OUT | |
2024-12-26 11:08:17 UTC | 15092 | OUT | |
2024-12-26 11:08:18 UTC | 1136 | IN | |
2024-12-26 11:08:18 UTC | 20 | IN | |
2024-12-26 11:08:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49740 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:20 UTC | 281 | OUT | |
2024-12-26 11:08:20 UTC | 15331 | OUT | |
2024-12-26 11:08:20 UTC | 4619 | OUT | |
2024-12-26 11:08:21 UTC | 1134 | IN | |
2024-12-26 11:08:21 UTC | 20 | IN | |
2024-12-26 11:08:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49751 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:22 UTC | 278 | OUT | |
2024-12-26 11:08:22 UTC | 1203 | OUT | |
2024-12-26 11:08:24 UTC | 1141 | IN | |
2024-12-26 11:08:24 UTC | 20 | IN | |
2024-12-26 11:08:24 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49757 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:26 UTC | 284 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:26 UTC | 15331 | OUT | |
2024-12-26 11:08:28 UTC | 1137 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49768 | 172.67.154.166 | 443 | 4040 | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-26 11:08:30 UTC | 266 | OUT | |
2024-12-26 11:08:30 UTC | 87 | OUT | |
2024-12-26 11:08:31 UTC | 1133 | IN | |
2024-12-26 11:08:31 UTC | 236 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN | |
2024-12-26 11:08:31 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 06:07:58 |
Start date: | 26/12/2024 |
Path: | C:\Users\user\Desktop\RIMz2N1u5y.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'791'344 bytes |
MD5 hash: | 0AFFFC327A38BDC6812B51507CACDCBE |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | Borland Delphi |
Yara matches: |
|
Reputation: | low |
Has exited: | true |
Execution Graph
Execution Coverage: | 1.4% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 36.7% |
Total number of Nodes: | 128 |
Total number of Limit Nodes: | 13 |
Graph
Function 008BF884 Relevance: 12.7, APIs: 8, Instructions: 730memorynativethreadCOMMON
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008707CF Relevance: 3.9, APIs: 1, Strings: 1, Instructions: 399threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00870D8F Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 103threadCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BE2E4 Relevance: 6.1, APIs: 4, Instructions: 99memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BF154 Relevance: 4.8, APIs: 3, Instructions: 325memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008C0502 Relevance: 3.6, APIs: 1, Strings: 1, Instructions: 66libraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BE3DF Relevance: 3.0, APIs: 2, Instructions: 48memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A546D Relevance: 80.4, Strings: 64, Instructions: 372COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00894CFC Relevance: 29.2, Strings: 23, Instructions: 455COMMON
Control-flow Graph
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A72BC Relevance: 15.3, Strings: 12, Instructions: 262COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A6D5C Relevance: 12.7, Strings: 10, Instructions: 215COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A6039 Relevance: 12.7, Strings: 10, Instructions: 187COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087ACEC Relevance: 11.7, Strings: 9, Instructions: 450COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00890EC8 Relevance: 10.9, Strings: 8, Instructions: 927COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A763C Relevance: 9.4, Strings: 7, Instructions: 656COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088B26C Relevance: 9.0, Strings: 6, Instructions: 1469COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088F58C Relevance: 8.4, Strings: 6, Instructions: 870COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00882F7A Relevance: 8.0, Strings: 6, Instructions: 522COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087AA8C Relevance: 7.8, Strings: 6, Instructions: 254COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087B1CC Relevance: 6.6, Strings: 5, Instructions: 359COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088DC86 Relevance: 6.5, Strings: 5, Instructions: 207COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087FF1D Relevance: 6.4, Strings: 5, Instructions: 184COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089CD70 Relevance: 6.0, Strings: 4, Instructions: 976COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087F827 Relevance: 5.3, Strings: 4, Instructions: 312COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089BE62 Relevance: 5.3, Strings: 4, Instructions: 286COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089C9E1 Relevance: 5.3, Strings: 4, Instructions: 285COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089E1A4 Relevance: 5.3, Strings: 4, Instructions: 280COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008ABA6C Relevance: 5.0, Strings: 4, Instructions: 45COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AADFC Relevance: 4.4, Strings: 3, Instructions: 614COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A80DC Relevance: 4.3, Strings: 3, Instructions: 505COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089D900 Relevance: 4.2, Strings: 3, Instructions: 400COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088DF82 Relevance: 4.1, Strings: 3, Instructions: 331COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00886F72 Relevance: 4.0, Strings: 3, Instructions: 236COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089C261 Relevance: 4.0, Strings: 3, Instructions: 209COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087FEEC Relevance: 3.9, Strings: 3, Instructions: 176COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089412C Relevance: 3.8, Strings: 3, Instructions: 97COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008839DC Relevance: 3.5, Strings: 1, Instructions: 2207COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087680C Relevance: 3.3, Strings: 2, Instructions: 814COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088E36C Relevance: 2.9, Strings: 2, Instructions: 438COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AF07C Relevance: 2.9, Strings: 2, Instructions: 393COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087C54C Relevance: 2.9, Strings: 2, Instructions: 391COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00875EDC Relevance: 2.8, Strings: 2, Instructions: 329COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089C2C9 Relevance: 2.7, Strings: 2, Instructions: 202COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00898695 Relevance: 2.6, Strings: 2, Instructions: 69COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BC58C Relevance: 2.3, Strings: 1, Instructions: 1066COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00887EF3 Relevance: 1.8, Strings: 1, Instructions: 580COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00870000 Relevance: 1.8, Strings: 1, Instructions: 548COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00892DBC Relevance: 1.7, Strings: 1, Instructions: 446COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089AB0C Relevance: 1.7, Strings: 1, Instructions: 416COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089C0E3 Relevance: 1.6, Strings: 1, Instructions: 349COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00896ECC Relevance: 1.6, Strings: 1, Instructions: 325COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00892A5C Relevance: 1.6, Strings: 1, Instructions: 316COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A0DEC Relevance: 1.5, Strings: 1, Instructions: 274COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088EBFC Relevance: 1.5, Strings: 1, Instructions: 265COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008779DC Relevance: 1.5, Strings: 1, Instructions: 263COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AA9AC Relevance: 1.5, Strings: 1, Instructions: 217COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089FDCA Relevance: 1.5, Strings: 1, Instructions: 208COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089068C Relevance: 1.4, Strings: 1, Instructions: 199COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AE33C Relevance: 1.4, Strings: 1, Instructions: 141COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AE5EC Relevance: 1.4, Strings: 1, Instructions: 106COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008965EA Relevance: 1.3, Strings: 1, Instructions: 68COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00895F6C Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008ACBD6 Relevance: 1.3, Strings: 1, Instructions: 38COMMON
Strings |
|
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087820C Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00874B2C Relevance: .7, Instructions: 657COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00878FEC Relevance: .6, Instructions: 612COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087552C Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088D5F2 Relevance: .5, Instructions: 545COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BAE90 Relevance: .4, Instructions: 429COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BC154 Relevance: .4, Instructions: 409COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087751C Relevance: .4, Instructions: 400COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BBD84 Relevance: .4, Instructions: 380COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AEC9C Relevance: .4, Instructions: 368COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088EECC Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008895C7 Relevance: .3, Instructions: 334COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AE9AC Relevance: .3, Instructions: 314COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00877D7C Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00888CD7 Relevance: .3, Instructions: 298COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008BD02C Relevance: .3, Instructions: 283COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087E434 Relevance: .3, Instructions: 279COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A29DC Relevance: .3, Instructions: 259COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AE70C Relevance: .3, Instructions: 253COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AA44C Relevance: .2, Instructions: 248COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087A0FC Relevance: .2, Instructions: 237COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00889A96 Relevance: .2, Instructions: 220COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00873EFC Relevance: .2, Instructions: 206COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A6AFC Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088AAB0 Relevance: .2, Instructions: 180COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088A084 Relevance: .2, Instructions: 169COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00886DE2 Relevance: .2, Instructions: 166COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00888760 Relevance: .2, Instructions: 164COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087460C Relevance: .2, Instructions: 159COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087E07F Relevance: .1, Instructions: 149COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00899677 Relevance: .1, Instructions: 144COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089B20C Relevance: .1, Instructions: 140COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089726C Relevance: .1, Instructions: 109COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008713DF Relevance: .1, Instructions: 107COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008AC8ED Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008861E8 Relevance: .1, Instructions: 69COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008713DE Relevance: .1, Instructions: 66COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008A4D7C Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0089A57C Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008747EC Relevance: .0, Instructions: 47COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008988E1 Relevance: .0, Instructions: 39COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008ACB6C Relevance: .0, Instructions: 35COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087113F Relevance: .0, Instructions: 33COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0088A893 Relevance: .0, Instructions: 31COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087BFE8 Relevance: .0, Instructions: 28COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 0087DA6E Relevance: .0, Instructions: 12COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 00899628 Relevance: .0, Instructions: 9COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|
Function 008988DC Relevance: .0, Instructions: 7COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|