Windows
Analysis Report
0x001f00000004676d-1858.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- 0x001f00000004676d-1858.exe (PID: 6192 cmdline:
"C:\Users\ user\Deskt op\0x001f0 0000004676 d-1858.exe " MD5: AB4263D8BD7675F83C88DB675D103F3E) - conhost.exe (PID: 6348 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - 0x001f00000004676d-1858.exe (PID: 4996 cmdline:
"C:\Users\ user\Deskt op\0x001f0 0000004676 d-1858.exe " MD5: AB4263D8BD7675F83C88DB675D103F3E) - 0x001f00000004676d-1858.exe (PID: 4196 cmdline:
"C:\Users\ user\Deskt op\0x001f0 0000004676 d-1858.exe " MD5: AB4263D8BD7675F83C88DB675D103F3E) - 0x001f00000004676d-1858.exe (PID: 2020 cmdline:
"C:\Users\ user\Deskt op\0x001f0 0000004676 d-1858.exe " MD5: AB4263D8BD7675F83C88DB675D103F3E)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["rebuildeso.buzz", "scentniej.buzz", "mindhandru.buzz", "screwamusresz.buzz", "appliacnesot.buzz", "inherineau.buzz", "prisonyfork.buzz", "hummskitnj.buzz", "cashfuzysao.buzz"], "Build id": "yau6Na--6299960613"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
Click to see the 3 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:34:57.678046+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:29.900191+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:43.058758+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:45.528794+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49776 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:47.983491+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49782 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:50.294508+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49790 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:52.910954+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49796 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:56.040623+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49804 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:59.839892+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49814 | 104.21.74.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:35:28.125233+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:41.808798+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:43.824284+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:36:00.622792+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49814 | 104.21.74.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:35:28.125233+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:41.808798+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:35:43.824284+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:35:46.501541+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49776 | 104.21.74.40 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 5_2_00415216 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00B91FE9 | |
Source: | Code function: | 0_2_00B91F38 | |
Source: | Code function: | 3_2_00B91FE9 | |
Source: | Code function: | 3_2_00B91F38 |
Source: | Code function: | 5_2_00427170 | |
Source: | Code function: | 5_2_00415216 | |
Source: | Code function: | 5_2_004222A2 | |
Source: | Code function: | 5_2_0043DC6A | |
Source: | Code function: | 5_2_0043FCD0 | |
Source: | Code function: | 5_2_0042CD97 | |
Source: | Code function: | 5_2_0041BE10 | |
Source: | Code function: | 5_2_0043DE17 | |
Source: | Code function: | 5_2_0040DEBE | |
Source: | Code function: | 5_2_0040DEBE | |
Source: | Code function: | 5_2_0040D715 | |
Source: | Code function: | 5_2_00439000 | |
Source: | Code function: | 5_2_00439000 | |
Source: | Code function: | 5_2_00408820 | |
Source: | Code function: | 5_2_004090D0 | |
Source: | Code function: | 5_2_004260DD | |
Source: | Code function: | 5_2_00435880 | |
Source: | Code function: | 5_2_00426090 | |
Source: | Code function: | 5_2_00417097 | |
Source: | Code function: | 5_2_0041409E | |
Source: | Code function: | 5_2_004160AC | |
Source: | Code function: | 5_2_0040D94C | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_0041417E | |
Source: | Code function: | 5_2_0042A900 | |
Source: | Code function: | 5_2_0041613C | |
Source: | Code function: | 5_2_004169C0 | |
Source: | Code function: | 5_2_004169C0 | |
Source: | Code function: | 5_2_004239C0 | |
Source: | Code function: | 5_2_0041D9D0 | |
Source: | Code function: | 5_2_00427190 | |
Source: | Code function: | 5_2_0042A9A0 | |
Source: | Code function: | 5_2_004289B1 | |
Source: | Code function: | 5_2_0041CA48 | |
Source: | Code function: | 5_2_004260DD | |
Source: | Code function: | 5_2_0042DA08 | |
Source: | Code function: | 5_2_0041CA31 | |
Source: | Code function: | 5_2_00414230 | |
Source: | Code function: | 5_2_00414230 | |
Source: | Code function: | 5_2_00414230 | |
Source: | Code function: | 5_2_00414230 | |
Source: | Code function: | 5_2_00439280 | |
Source: | Code function: | 5_2_00439280 | |
Source: | Code function: | 5_2_00439280 | |
Source: | Code function: | 5_2_00439280 | |
Source: | Code function: | 5_2_0040AAA0 | |
Source: | Code function: | 5_2_0042D2BA | |
Source: | Code function: | 5_2_0042BB6C | |
Source: | Code function: | 5_2_00429B82 | |
Source: | Code function: | 5_2_0042CB6D | |
Source: | Code function: | 5_2_0043E372 | |
Source: | Code function: | 5_2_00427BEA | |
Source: | Code function: | 5_2_00429B82 | |
Source: | Code function: | 5_2_00423B80 | |
Source: | Code function: | 5_2_00421B90 | |
Source: | Code function: | 5_2_00429BB6 | |
Source: | Code function: | 5_2_00429BB6 | |
Source: | Code function: | 5_2_0042546B | |
Source: | Code function: | 5_2_00409C3D | |
Source: | Code function: | 5_2_00429CF0 | |
Source: | Code function: | 5_2_00428C9B | |
Source: | Code function: | 5_2_00428C9B | |
Source: | Code function: | 5_2_00407540 | |
Source: | Code function: | 5_2_00407540 | |
Source: | Code function: | 5_2_0042BD50 | |
Source: | Code function: | 5_2_0041850C | |
Source: | Code function: | 5_2_0041AD3D | |
Source: | Code function: | 5_2_0041C5C0 | |
Source: | Code function: | 5_2_00415DC6 | |
Source: | Code function: | 5_2_00416DA0 | |
Source: | Code function: | 5_2_0042DDAB | |
Source: | Code function: | 5_2_00408E50 | |
Source: | Code function: | 5_2_00408E50 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00417E2E | |
Source: | Code function: | 5_2_00429E35 | |
Source: | Code function: | 5_2_00429E35 | |
Source: | Code function: | 5_2_0042AED0 | |
Source: | Code function: | 5_2_0043E6DB | |
Source: | Code function: | 5_2_0040CEDB | |
Source: | Code function: | 5_2_0040BF63 | |
Source: | Code function: | 5_2_00439760 | |
Source: | Code function: | 5_2_00423720 | |
Source: | Code function: | 5_2_00416FC1 | |
Source: | Code function: | 5_2_004297C1 | |
Source: | Code function: | 5_2_00428FD0 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_004297C1 | |
Source: | Code function: | 5_2_0043FFB0 | |
Source: | Code function: | 5_2_0043FFB0 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 5_2_00433440 |
Source: | Code function: | 5_2_05631000 |
Source: | Code function: | 5_2_00433440 |
Source: | Code function: | 5_2_00433650 |
Source: | Code function: | 0_2_00B71000 | |
Source: | Code function: | 0_2_00B7F555 | |
Source: | Code function: | 0_2_00B97792 | |
Source: | Code function: | 0_2_00B89CC0 | |
Source: | Code function: | 0_2_00B95C5E | |
Source: | Code function: | 0_2_00B83FB2 | |
Source: | Code function: | 3_2_00B71000 | |
Source: | Code function: | 3_2_00B7F555 | |
Source: | Code function: | 3_2_00B97792 | |
Source: | Code function: | 3_2_00B89CC0 | |
Source: | Code function: | 3_2_00B95C5E | |
Source: | Code function: | 3_2_00B83FB2 | |
Source: | Code function: | 5_2_00423171 | |
Source: | Code function: | 5_2_0041F1A7 | |
Source: | Code function: | 5_2_00415216 | |
Source: | Code function: | 5_2_00411A80 | |
Source: | Code function: | 5_2_004222A2 | |
Source: | Code function: | 5_2_004383E0 | |
Source: | Code function: | 5_2_0043BC30 | |
Source: | Code function: | 5_2_0043FCD0 | |
Source: | Code function: | 5_2_00426C90 | |
Source: | Code function: | 5_2_0042CD97 | |
Source: | Code function: | 5_2_0041BE10 | |
Source: | Code function: | 5_2_00440680 | |
Source: | Code function: | 5_2_0040DEBE | |
Source: | Code function: | 5_2_00438760 | |
Source: | Code function: | 5_2_00421840 | |
Source: | Code function: | 5_2_00439000 | |
Source: | Code function: | 5_2_00408820 | |
Source: | Code function: | 5_2_0040F838 | |
Source: | Code function: | 5_2_004188C8 | |
Source: | Code function: | 5_2_004090D0 | |
Source: | Code function: | 5_2_004260DD | |
Source: | Code function: | 5_2_0041D090 | |
Source: | Code function: | 5_2_00426090 | |
Source: | Code function: | 5_2_0041409E | |
Source: | Code function: | 5_2_0040B0BC | |
Source: | Code function: | 5_2_00403940 | |
Source: | Code function: | 5_2_00419970 | |
Source: | Code function: | 5_2_0042C176 | |
Source: | Code function: | 5_2_00439900 | |
Source: | Code function: | 5_2_00405910 | |
Source: | Code function: | 5_2_00430917 | |
Source: | Code function: | 5_2_004169C0 | |
Source: | Code function: | 5_2_004239C0 | |
Source: | Code function: | 5_2_004291C7 | |
Source: | Code function: | 5_2_0041D9D0 | |
Source: | Code function: | 5_2_004331D0 | |
Source: | Code function: | 5_2_00427190 | |
Source: | Code function: | 5_2_00417A7E | |
Source: | Code function: | 5_2_004260DD | |
Source: | Code function: | 5_2_0042DA08 | |
Source: | Code function: | 5_2_004082C0 | |
Source: | Code function: | 5_2_00439AC2 | |
Source: | Code function: | 5_2_004062D0 | |
Source: | Code function: | 5_2_004042F0 | |
Source: | Code function: | 5_2_00436AF0 | |
Source: | Code function: | 5_2_004402F0 | |
Source: | Code function: | 5_2_00439280 | |
Source: | Code function: | 5_2_00431290 | |
Source: | Code function: | 5_2_0040AAA0 | |
Source: | Code function: | 5_2_0043F2B0 | |
Source: | Code function: | 5_2_00422B52 | |
Source: | Code function: | 5_2_00422B70 | |
Source: | Code function: | 5_2_00437B70 | |
Source: | Code function: | 5_2_0043F3D0 | |
Source: | Code function: | 5_2_00427BEA | |
Source: | Code function: | 5_2_0043F3EB | |
Source: | Code function: | 5_2_0043F3E9 | |
Source: | Code function: | 5_2_00402B80 | |
Source: | Code function: | 5_2_00421B90 | |
Source: | Code function: | 5_2_0042B3A0 | |
Source: | Code function: | 5_2_00433440 | |
Source: | Code function: | 5_2_0043EC6B | |
Source: | Code function: | 5_2_0042546B | |
Source: | Code function: | 5_2_0042EC18 | |
Source: | Code function: | 5_2_00404C20 | |
Source: | Code function: | 5_2_00423C26 | |
Source: | Code function: | 5_2_00428C9B | |
Source: | Code function: | 5_2_0041D4A0 | |
Source: | Code function: | 5_2_00407540 | |
Source: | Code function: | 5_2_00425D70 | |
Source: | Code function: | 5_2_0041850C | |
Source: | Code function: | 5_2_00428513 | |
Source: | Code function: | 5_2_00430D16 | |
Source: | Code function: | 5_2_0043C520 | |
Source: | Code function: | 5_2_0043652F | |
Source: | Code function: | 5_2_0043F530 | |
Source: | Code function: | 5_2_0041CDC0 | |
Source: | Code function: | 5_2_00415DC6 | |
Source: | Code function: | 5_2_004095D0 | |
Source: | Code function: | 5_2_00437DD0 | |
Source: | Code function: | 5_2_0042BDB3 | |
Source: | Code function: | 5_2_0043F5B0 | |
Source: | Code function: | 5_2_0043F650 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00417E2E | |
Source: | Code function: | 5_2_00429E35 | |
Source: | Code function: | 5_2_0042AED0 | |
Source: | Code function: | 5_2_00402F40 | |
Source: | Code function: | 5_2_00406760 | |
Source: | Code function: | 5_2_00417707 | |
Source: | Code function: | 5_2_00423720 | |
Source: | Code function: | 5_2_00405F30 | |
Source: | Code function: | 5_2_0041D7C0 | |
Source: | Code function: | 5_2_00416600 | |
Source: | Code function: | 5_2_00432F80 | |
Source: | Code function: | 5_2_00410FAE | |
Source: | Code function: | 5_2_0043FFB0 |
Source: | Static PE information: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 5_2_00438760 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00B7FB96 | |
Source: | Code function: | 3_2_00B7FB96 | |
Source: | Code function: | 5_2_0043C04F | |
Source: | Code function: | 5_2_0043F252 | |
Source: | Code function: | 5_2_004465A5 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Evasive API call chain: | graph_0-20905 |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00B91FE9 | |
Source: | Code function: | 0_2_00B91F38 | |
Source: | Code function: | 3_2_00B91FE9 | |
Source: | Code function: | 3_2_00B91F38 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_5-14183 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 5_2_0043D970 |
Source: | Code function: | 0_2_00B7F8E9 |
Source: | Code function: | 0_2_00BAA19E | |
Source: | Code function: | 0_2_00B71FB0 | |
Source: | Code function: | 3_2_00B71FB0 |
Source: | Code function: | 0_2_00B8D8E0 |
Source: | Code function: | 0_2_00B7F52D | |
Source: | Code function: | 0_2_00B7F8E9 | |
Source: | Code function: | 0_2_00B7F8DD | |
Source: | Code function: | 0_2_00B87E30 | |
Source: | Code function: | 3_2_00B7F52D | |
Source: | Code function: | 3_2_00B7F8E9 | |
Source: | Code function: | 3_2_00B7F8DD | |
Source: | Code function: | 3_2_00B87E30 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00BAA19E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00B8D1BD | |
Source: | Code function: | 0_2_00B91287 | |
Source: | Code function: | 0_2_00B914D8 | |
Source: | Code function: | 0_2_00B91580 | |
Source: | Code function: | 0_2_00B917D3 | |
Source: | Code function: | 0_2_00B91840 | |
Source: | Code function: | 0_2_00B91915 | |
Source: | Code function: | 0_2_00B91960 | |
Source: | Code function: | 0_2_00B91A07 | |
Source: | Code function: | 0_2_00B91B0D | |
Source: | Code function: | 0_2_00B8CC15 | |
Source: | Code function: | 3_2_00B8D1BD | |
Source: | Code function: | 3_2_00B91287 | |
Source: | Code function: | 3_2_00B914D8 | |
Source: | Code function: | 3_2_00B91580 | |
Source: | Code function: | 3_2_00B917D3 | |
Source: | Code function: | 3_2_00B91840 | |
Source: | Code function: | 3_2_00B91915 | |
Source: | Code function: | 3_2_00B91960 | |
Source: | Code function: | 3_2_00B91A07 | |
Source: | Code function: | 3_2_00B91B0D | |
Source: | Code function: | 3_2_00B8CC15 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00B800B4 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 241 Security Software Discovery | SMB/Windows Admin Shares | 4 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 21 Virtualization/Sandbox Evasion | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 1 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 33 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
prisonyfork.buzz | 104.21.74.40 | true | true | unknown | |
mindhandru.buzz | 104.21.11.101 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.74.40 | prisonyfork.buzz | United States | 13335 | CLOUDFLARENETUS | true | |
104.21.11.101 | mindhandru.buzz | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581423 |
Start date and time: | 2024-12-27 15:34:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 0x001f00000004676d-1858.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@8/1@2/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target 0x001f00000004676d-1858.exe, PID 4996 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: 0x001f00000004676d-1858.exe
Time | Type | Description |
---|---|---|
09:35:27 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.74.40 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | HTMLPhisher | Browse | |||
104.21.11.101 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse | |||
Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
mindhandru.buzz | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
prisonyfork.buzz | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRAT | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer, Stealc | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Process: | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 14402 |
Entropy (8bit): | 4.874636730022465 |
Encrypted: | false |
SSDEEP: | 384:vlICCmV5fTMzsM3qlICCmV5fTMzsM3ip9guFx2rBhiLfmfU:vGCC+dMOGCC+dMY9guFx2rBo |
MD5: | DF0EFD0545733561C6E165770FB3661C |
SHA1: | 0F3AD477176CF235C6C59EE2EB15D81DCB6178A8 |
SHA-256: | A434B406E97A2C892FA88C3975D8181EBEA62A8DA919C5221409E425DF50FD17 |
SHA-512: | 3FF527435BC8BCF2640E0B64725CC0DB8A801D912698D4D94C44200529268B80AA7B59A2E2A2EA6C4621E09AA249AAA3583A8D90E4F5D7B68E0E6FFFEB759918 |
Malicious: | false |
Reputation: | low |
Preview: |
File type: | |
Entropy (8bit): | 7.569168685333213 |
TrID: |
|
File name: | 0x001f00000004676d-1858.exe |
File size: | 571'432 bytes |
MD5: | ab4263d8bd7675f83c88db675d103f3e |
SHA1: | 8e0496273f2114ff93831c89c2588c4bf6e3f031 |
SHA256: | 1c8bbdd85f8966054492c3e859c42657e50398f01325b064426a584670646486 |
SHA512: | 29cff72b4aa916f9fa3fa3cec3e3a573c177a2a6d61aa5fa218b575abc5644e8021571157c6f5ec679e57c56d804da5ba5be416156485dd365c88bf64b272167 |
SSDEEP: | 12288:WYO6Dqzihouxpa+yW7baOWofIN7mxWQrDEb9+NYFEO:PO6DThou2+ysNjINixWVUNYFt |
TLSH: | D0C4E0127690C4B2D9571A7759B5D7391A3FB8200F2296CB93984FBDCEB03C14E31A6E |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....ng..........................................@..................................W....@.................................|j..<.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4104a0 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x676E98E6 [Fri Dec 27 12:09:10 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 96d90e8808da099bc17e050394f447e7 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 5F1B6B6C408DB2B4D60BAA489E9A0E5A |
Thumbprint SHA-1: | 15F760D82C79D22446CC7D4806540BF632B1E104 |
Thumbprint SHA-256: | 28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D |
Serial: | 0997C56CAA59055394D9A9CDB8BEEB56 |
Instruction |
---|
call 00007F4380D56D5Ah |
jmp 00007F4380D56BBDh |
mov ecx, dword ptr [0043B680h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007F4380D56D56h |
test esi, ecx |
jne 00007F4380D56D78h |
call 00007F4380D56D81h |
mov ecx, eax |
cmp ecx, edi |
jne 00007F4380D56D59h |
mov ecx, BB40E64Fh |
jmp 00007F4380D56D60h |
test esi, ecx |
jne 00007F4380D56D5Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [0043B680h], ecx |
not ecx |
pop edi |
mov dword ptr [0043B6C0h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [00436D00h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [00436CB8h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [00436CB4h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [00436D50h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 0043CF48h |
call dword ptr [00436D28h] |
ret |
push 00030000h |
push 00010000h |
push 00000000h |
call 00007F4380D5DB33h |
add esp, 0Ch |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x36a7c | 0x3c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8e000 | 0x3fc | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x89200 | 0x2628 | .bss |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x3f000 | 0x2744 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x32608 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2ea98 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x36c3c | 0x184 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2b4ca | 0x2b600 | ebf84c6b836020b1a66433a898baeab7 | False | 0.5443702719740634 | data | 6.596404756541432 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x2d000 | 0xc50c | 0xc600 | 96e76e7ef084461591b1dcd4c2131f05 | False | 0.40260022095959597 | data | 4.741850626178578 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x3a000 | 0x3714 | 0x2800 | d87fd4546a2b39263a028b496b33108f | False | 0.29814453125 | data | 5.024681407682101 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x3e000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.reloc | 0x3f000 | 0x2744 | 0x2800 | c7508b57e36483307c47b7dd73fc0c85 | False | 0.75166015625 | data | 6.531416896423856 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.bss | 0x42000 | 0x4ba00 | 0x4ba00 | 14b536f3b9dfafb92c38280374b415ea | False | 1.0003260588842975 | data | 7.999364581884296 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x8e000 | 0x3fc | 0x400 | 4243bfa36d7c6187562be2edfa0b46c2 | False | 0.443359375 | data | 3.391431520369637 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0x8e058 | 0x3a4 | data | English | United States | 0.44849785407725323 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CloseThreadpoolWork, CompareStringW, CreateFileW, CreateThread, CreateThreadpoolWork, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, ExitThread, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, FreeLibraryAndExitThread, FreeLibraryWhenCallbackReturns, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetConsoleWindow, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetExitCodeThread, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitOnceBeginInitialize, InitOnceComplete, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, SubmitThreadpoolWork, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TryAcquireSRWLockExclusive, UnhandledExceptionFilter, WaitForSingleObjectEx, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
USER32.dll | ShowWindow |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-27T15:34:57.678046+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:28.125233+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:28.125233+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | TCP |
2024-12-27T15:35:29.900191+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:41.808798+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:41.808798+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:43.058758+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:43.824284+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:43.824284+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:45.528794+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49776 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:46.501541+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49776 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:47.983491+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49782 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:50.294508+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49790 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:52.910954+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49796 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:56.040623+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49804 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:35:59.839892+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49814 | 104.21.74.40 | 443 | TCP |
2024-12-27T15:36:00.622792+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49814 | 104.21.74.40 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 15:34:56.454658031 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:56.454706907 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:34:56.454915047 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:56.456233025 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:56.456252098 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:34:57.677958965 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:34:57.678045988 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:57.696588039 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:57.696600914 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:34:57.697004080 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:34:57.748670101 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:57.834709883 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:57.834732056 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:34:57.834870100 CET | 443 | 49708 | 104.21.11.101 | 192.168.2.5 |
Dec 27, 2024 15:35:28.124880075 CET | 49708 | 443 | 192.168.2.5 | 104.21.11.101 |
Dec 27, 2024 15:35:28.599247932 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:28.599301100 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:28.599431992 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:28.599901915 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:28.599917889 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:29.900074005 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:29.900191069 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:29.903950930 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:29.903979063 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:29.904216051 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:29.914422035 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:29.914452076 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:29.914499998 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.808820963 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.808902979 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.808953047 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.810235023 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.810247898 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.810267925 CET | 49741 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.810277939 CET | 443 | 49741 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.819549084 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.819633961 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:41.819710016 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.820099115 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:41.820127964 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.058653116 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.058758020 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.060103893 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.060118914 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.060323954 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.061631918 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.061654091 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.061693907 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824326038 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824363947 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824390888 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824418068 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824424028 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.824455023 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.824472904 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.832340956 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.832398891 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.832408905 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.840650082 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.840709925 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.840720892 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.852024078 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.852092028 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.852101088 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.904918909 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.943841934 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:43.998692989 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:43.998706102 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.019823074 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.019855976 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.019926071 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.020021915 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.020021915 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.036551952 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.036590099 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.036667109 CET | 49770 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.036683083 CET | 443 | 49770 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.268234015 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.268300056 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:44.268376112 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.268708944 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:44.268724918 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:45.528600931 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:45.528794050 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:45.530123949 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:45.530138969 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:45.530462027 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:45.531632900 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:45.531785965 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:45.531826019 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:46.501543999 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:46.501681089 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:46.501739025 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:46.501863956 CET | 49776 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:46.501884937 CET | 443 | 49776 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:46.677134037 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:46.677156925 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:46.677231073 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:46.677669048 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:46.677683115 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:47.983419895 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:47.983490944 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:47.984693050 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:47.984699965 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:47.985014915 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:47.986752033 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:47.986855030 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:47.986886024 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:47.989352942 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:48.031333923 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:48.878200054 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:48.878312111 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:48.878467083 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:48.878880024 CET | 49782 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:48.878895044 CET | 443 | 49782 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:49.083307028 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:49.083417892 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:49.083575964 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:49.083910942 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:49.083945036 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:50.294317961 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:50.294507980 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:50.295543909 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:50.295561075 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:50.295764923 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:50.297256947 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:50.297416925 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:50.297454119 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:50.297511101 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:50.297522068 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:51.285820961 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:51.285916090 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:51.285979986 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:51.286048889 CET | 49790 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:51.286083937 CET | 443 | 49790 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:51.607543945 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:51.607630968 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:51.607722044 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:51.608088017 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:51.608124018 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:52.910872936 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:52.910953999 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:52.912060022 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:52.912071943 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:52.912293911 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:52.913446903 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:52.913541079 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:52.913552046 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:54.168708086 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:54.168792963 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:54.168898106 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:54.169125080 CET | 49796 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:54.169161081 CET | 443 | 49796 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:54.781445980 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:54.781474113 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:54.781682968 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:54.782052994 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:54.782068014 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.040498972 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.040622950 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.041774988 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.041785002 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.042001009 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.058043003 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.058696032 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.058732033 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.058813095 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.058845043 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059361935 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059405088 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059504032 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059534073 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059643984 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059674978 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059787035 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059824944 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059839010 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059847116 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059940100 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.059962988 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.059979916 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.060091019 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.060122967 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.107327938 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.107481003 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.107520103 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.107541084 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.107557058 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:56.107579947 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:56.107610941 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:58.473795891 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:58.473877907 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:58.473932028 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:58.474101067 CET | 49804 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:58.474123955 CET | 443 | 49804 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:58.529467106 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:58.529506922 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:58.529587030 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:58.529860020 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:58.529875994 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:59.839751005 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:59.839891911 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:59.841048956 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:59.841080904 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:59.841312885 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:35:59.842530966 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:59.842570066 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:35:59.842612028 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.622828007 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.622898102 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.622927904 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.622978926 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.622992992 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.623008013 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.623053074 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.623091936 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.623114109 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.630845070 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.639239073 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.639362097 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.639365911 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.639417887 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.639492035 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.647547960 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.647825003 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.647882938 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.647953033 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.647989988 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Dec 27, 2024 15:36:00.648015976 CET | 49814 | 443 | 192.168.2.5 | 104.21.74.40 |
Dec 27, 2024 15:36:00.648030996 CET | 443 | 49814 | 104.21.74.40 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 27, 2024 15:34:56.154674053 CET | 60726 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 15:34:56.447415113 CET | 53 | 60726 | 1.1.1.1 | 192.168.2.5 |
Dec 27, 2024 15:35:28.132987022 CET | 62020 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 27, 2024 15:35:28.597863913 CET | 53 | 62020 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 27, 2024 15:34:56.154674053 CET | 192.168.2.5 | 1.1.1.1 | 0x1ac1 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 27, 2024 15:35:28.132987022 CET | 192.168.2.5 | 1.1.1.1 | 0x3f16 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 27, 2024 15:34:56.447415113 CET | 1.1.1.1 | 192.168.2.5 | 0x1ac1 | No error (0) | 104.21.11.101 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 15:34:56.447415113 CET | 1.1.1.1 | 192.168.2.5 | 0x1ac1 | No error (0) | 172.67.165.185 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 15:35:28.597863913 CET | 1.1.1.1 | 192.168.2.5 | 0x3f16 | No error (0) | 104.21.74.40 | A (IP address) | IN (0x0001) | false | ||
Dec 27, 2024 15:35:28.597863913 CET | 1.1.1.1 | 192.168.2.5 | 0x3f16 | No error (0) | 172.67.197.192 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49708 | 104.21.11.101 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:34:57 UTC | 262 | OUT | |
2024-12-27 14:34:57 UTC | 8 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49741 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:29 UTC | 263 | OUT | |
2024-12-27 14:35:29 UTC | 8 | OUT | |
2024-12-27 14:35:41 UTC | 1129 | IN | |
2024-12-27 14:35:41 UTC | 7 | IN | |
2024-12-27 14:35:41 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49770 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:43 UTC | 264 | OUT | |
2024-12-27 14:35:43 UTC | 52 | OUT | |
2024-12-27 14:35:43 UTC | 1121 | IN | |
2024-12-27 14:35:43 UTC | 248 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN | |
2024-12-27 14:35:43 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49776 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:45 UTC | 273 | OUT | |
2024-12-27 14:35:45 UTC | 12786 | OUT | |
2024-12-27 14:35:46 UTC | 1130 | IN | |
2024-12-27 14:35:46 UTC | 20 | IN | |
2024-12-27 14:35:46 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49782 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:47 UTC | 277 | OUT | |
2024-12-27 14:35:47 UTC | 15052 | OUT | |
2024-12-27 14:35:48 UTC | 1121 | IN | |
2024-12-27 14:35:48 UTC | 20 | IN | |
2024-12-27 14:35:48 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49790 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:50 UTC | 274 | OUT | |
2024-12-27 14:35:50 UTC | 15331 | OUT | |
2024-12-27 14:35:50 UTC | 5193 | OUT | |
2024-12-27 14:35:51 UTC | 1119 | IN | |
2024-12-27 14:35:51 UTC | 20 | IN | |
2024-12-27 14:35:51 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49796 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:52 UTC | 277 | OUT | |
2024-12-27 14:35:52 UTC | 1240 | OUT | |
2024-12-27 14:35:54 UTC | 1123 | IN | |
2024-12-27 14:35:54 UTC | 20 | IN | |
2024-12-27 14:35:54 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49804 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:56 UTC | 279 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:56 UTC | 15331 | OUT | |
2024-12-27 14:35:58 UTC | 1135 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49814 | 104.21.74.40 | 443 | 2020 | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-27 14:35:59 UTC | 264 | OUT | |
2024-12-27 14:35:59 UTC | 87 | OUT | |
2024-12-27 14:36:00 UTC | 1123 | IN | |
2024-12-27 14:36:00 UTC | 246 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 81 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN | |
2024-12-27 14:36:00 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 09:34:54 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 571'432 bytes |
MD5 hash: | AB4263D8BD7675F83C88DB675D103F3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 09:34:54 |
Start date: | 27/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 09:34:54 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 571'432 bytes |
MD5 hash: | AB4263D8BD7675F83C88DB675D103F3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 09:34:55 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 571'432 bytes |
MD5 hash: | AB4263D8BD7675F83C88DB675D103F3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 5 |
Start time: | 09:34:55 |
Start date: | 27/12/2024 |
Path: | C:\Users\user\Desktop\0x001f00000004676d-1858.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb70000 |
File size: | 571'432 bytes |
MD5 hash: | AB4263D8BD7675F83C88DB675D103F3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 6.5% |
Dynamic/Decrypted Code Coverage: | 1.1% |
Signature Coverage: | 3.8% |
Total number of Nodes: | 815 |
Total number of Limit Nodes: | 22 |
Graph
Function 00BAA19E Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B71FB0 Relevance: 9.2, APIs: 6, Instructions: 200fileCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B71000 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B724B0 Relevance: 10.6, APIs: 7, Instructions: 83threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8CF0B Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B85349 Relevance: 4.6, APIs: 3, Instructions: 51threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B854EE Relevance: 4.5, APIs: 3, Instructions: 30threadCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B790F0 Relevance: 3.1, APIs: 2, Instructions: 73COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8DA52 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B71EF0 Relevance: 3.1, APIs: 2, Instructions: 60memoryCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B85470 Relevance: 3.0, APIs: 2, Instructions: 38threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B72270 Relevance: 3.0, APIs: 2, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8BED7 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7DEF0 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7CB40 Relevance: 1.6, APIs: 1, Instructions: 111COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7B060 Relevance: 1.6, APIs: 1, Instructions: 66COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7CB32 Relevance: 1.5, APIs: 1, Instructions: 47COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8D2B4 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B77770 Relevance: 1.5, APIs: 1, Instructions: 37COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8BF11 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B798F0 Relevance: 1.5, APIs: 1, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91A07 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B89CC0 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91FE9 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7F8E9 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91580 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7F555 Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91F38 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91840 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B83FB2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91960 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91B0D Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7F8DD Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8D8E0 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7FE29 Relevance: 12.2, APIs: 8, Instructions: 177COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8EE76 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B80080 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B79B30 Relevance: 9.1, APIs: 6, Instructions: 125COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8B56E Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B855C4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8D6EA Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7EFF1 Relevance: 7.6, APIs: 5, Instructions: 116threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B73C70 Relevance: 7.6, APIs: 5, Instructions: 111COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D4C2 Relevance: 7.5, APIs: 5, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B96940 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B77220 Relevance: 6.1, APIs: 4, Instructions: 129threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B74460 Relevance: 6.1, APIs: 4, Instructions: 112COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91DC6 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B82BA2 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B931BE Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7E892 Relevance: 6.1, APIs: 4, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B804F5 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B90976 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8B992 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 120COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B73E90 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 109COMMONLIBRARYCODE
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8B1FE Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7B46C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 59COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B72610 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 41COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B71FB0 Relevance: 7.7, APIs: 5, Instructions: 200fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91287 Relevance: 7.7, APIs: 5, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B89CC0 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91FE9 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7F8E9 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B9AAE2 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7FE29 Relevance: 12.2, APIs: 8, Instructions: 177COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8EE76 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B724B0 Relevance: 10.6, APIs: 7, Instructions: 83threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B80080 Relevance: 10.5, APIs: 3, Strings: 3, Instructions: 15libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B94F81 Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B79B30 Relevance: 9.1, APIs: 6, Instructions: 125COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8ACE7 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B855C4 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8D6EA Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7EFF1 Relevance: 7.6, APIs: 5, Instructions: 116threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B73C70 Relevance: 7.6, APIs: 5, Instructions: 111COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7D4C2 Relevance: 7.5, APIs: 5, Instructions: 49COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7ADD7 Relevance: 7.5, APIs: 5, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B96940 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B93F9E Relevance: 6.3, APIs: 4, Instructions: 333fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B8B295 Relevance: 6.2, APIs: 4, Instructions: 168COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B77220 Relevance: 6.1, APIs: 4, Instructions: 129threadCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B74460 Relevance: 6.1, APIs: 4, Instructions: 112COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B91DC6 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B82BA2 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B931BE Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B7E892 Relevance: 6.1, APIs: 4, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B9ADA0 Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.6% |
Dynamic/Decrypted Code Coverage: | 6.7% |
Signature Coverage: | 41.4% |
Total number of Nodes: | 239 |
Total number of Limit Nodes: | 14 |
Graph
Function 00411A80 Relevance: 192.9, APIs: 3, Strings: 106, Instructions: 2102COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438760 Relevance: 28.7, APIs: 11, Strings: 5, Instructions: 710memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05631000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004222A2 Relevance: 9.8, Strings: 7, Instructions: 1054COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BE10 Relevance: 5.6, Strings: 4, Instructions: 636COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427170 Relevance: 5.1, Strings: 4, Instructions: 131COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D970 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DE17 Relevance: 1.3, Strings: 1, Instructions: 70COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FCD0 Relevance: .3, Instructions: 287COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DC6A Relevance: .1, Instructions: 149COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CB6D Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D715 Relevance: .1, Instructions: 76COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408700 Relevance: 7.6, APIs: 5, Instructions: 81threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C733 Relevance: 3.1, APIs: 2, Instructions: 85COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C731 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042C6ED Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D8E0 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431F12 Relevance: 1.5, APIs: 1, Instructions: 26COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042E895 Relevance: 1.5, APIs: 1, Instructions: 24COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C8D0 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BC00 Relevance: 1.5, APIs: 1, Instructions: 15memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BBE0 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00433440 Relevance: 17.6, APIs: 6, Strings: 4, Instructions: 147clipboardCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D9D0 Relevance: 14.6, Strings: 11, Instructions: 896COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408E50 Relevance: 11.5, Strings: 9, Instructions: 256COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426090 Relevance: 9.2, Strings: 7, Instructions: 487COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004090D0 Relevance: 5.5, Strings: 4, Instructions: 464COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004169C0 Relevance: 5.3, Strings: 4, Instructions: 331COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CEDB Relevance: 5.2, Strings: 4, Instructions: 150COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427190 Relevance: 4.3, Strings: 3, Instructions: 515COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004260DD Relevance: 4.1, Strings: 3, Instructions: 386COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C5C0 Relevance: 2.9, Strings: 2, Instructions: 418COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00415DC6 Relevance: 2.7, Strings: 2, Instructions: 229COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA31 Relevance: 2.7, Strings: 2, Instructions: 195COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041CA48 Relevance: 2.7, Strings: 2, Instructions: 192COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429BB6 Relevance: 2.6, Strings: 2, Instructions: 63COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041409E Relevance: 1.8, Strings: 1, Instructions: 596COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00421B90 Relevance: 1.7, Strings: 1, Instructions: 491COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AED0 Relevance: 1.7, Strings: 1, Instructions: 431COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042546B Relevance: 1.7, Strings: 1, Instructions: 410COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040AAA0 Relevance: 1.6, Strings: 1, Instructions: 375COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DA08 Relevance: 1.5, Strings: 1, Instructions: 255COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042D2BA Relevance: 1.5, Strings: 1, Instructions: 229COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BB6C Relevance: 1.4, Strings: 1, Instructions: 164COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428FD0 Relevance: 1.4, Strings: 1, Instructions: 150COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416DA0 Relevance: 1.4, Strings: 1, Instructions: 134COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414230 Relevance: 1.4, Strings: 1, Instructions: 126COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041AD3D Relevance: 1.4, Strings: 1, Instructions: 120COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E6DB Relevance: 1.3, Strings: 1, Instructions: 99COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004289B1 Relevance: 1.3, Strings: 1, Instructions: 67COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041417E Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004297C1 Relevance: 1.3, Strings: 1, Instructions: 64COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409C3D Relevance: 1.3, Strings: 1, Instructions: 50COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043E372 Relevance: 1.3, Strings: 1, Instructions: 23COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407540 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439280 Relevance: .5, Instructions: 479COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416600 Relevance: .3, Instructions: 342COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FFB0 Relevance: .3, Instructions: 318COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429B82 Relevance: .2, Instructions: 249COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439000 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A9A0 Relevance: .2, Instructions: 221COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00439760 Relevance: .2, Instructions: 162COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408820 Relevance: .1, Instructions: 130COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040D94C Relevance: .1, Instructions: 95COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416FC1 Relevance: .1, Instructions: 93COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00417097 Relevance: .1, Instructions: 80COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041613C Relevance: .1, Instructions: 70COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00435880 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A900 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004160AC Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042BD50 Relevance: .0, Instructions: 38COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040BF63 Relevance: .0, Instructions: 21COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004322F6 Relevance: 29.9, APIs: 1, Strings: 16, Instructions: 127memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|