Windows
Analysis Report
!Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- !Setup.exe (PID: 7488 cmdline:
"C:\Users\ user\Deskt op\!Setup. exe" MD5: CB8F02134E7A9E082E0D9BF4C988B202) - cmd.exe (PID: 7528 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ca mpaigns Ca mpaigns.cm d & Campai gns.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7616 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7624 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7668 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7676 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7712 cmdline:
cmd /c md 71992 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 7728 cmdline:
extrac32 / Y /E Ec MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 7752 cmdline:
findstr /V "Ratio" R eturning MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7768 cmdline:
cmd /c cop y /b 71992 \Banned.co m + Fwd + Rise + Des igned + Ba lanced + A vailable + Dir + Soc cer + Race + Ford + Writing 71 992\Banned .com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 7784 cmdline:
cmd /c cop y /b ..\Bi ds + ..\Ce o + ..\Thr oat + ..\H all + ..\A ccess + .. \Availabil ity + ..\S cout + ..\ War V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Banned.com (PID: 7800 cmdline:
Banned.com V MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 1852 cmdline:
powershell -exec byp ass -f "C: \Users\use r\AppData\ Local\Temp \9OMAF2HFF RD0LNMKR.p s1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 2364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 7820 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:52.982519+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:55.105526+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:57.741369+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:00.002405+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49747 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:02.211154+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49753 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:04.685957+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49759 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:07.125925+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49765 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:10.815856+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49774 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:13.030490+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49779 | 104.26.3.16 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:53.839595+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:55.897918+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:11.594130+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49774 | 104.21.37.209 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:53.839595+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:55.897918+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:36:05.504971+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49759 | 104.21.37.209 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior | ||
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 111 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 1 Web Service | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 221 Virtualization/Sandbox Evasion | 11 Input Capture | 3 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 221 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | 1 Clipboard Data | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 13 File and Directory Discovery | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 25 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
27% | ReversingLabs | Win32.Trojan.Generic | ||
17% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fallyjustif.click | 104.21.37.209 | true | true | unknown | |
rentry.co | 104.26.3.16 | true | false | high | |
xhWaXURTqNAudpSlyMZZXaDi.xhWaXURTqNAudpSlyMZZXaDi | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.37.209 | fallyjustif.click | United States | 13335 | CLOUDFLARENETUS | true | |
104.26.3.16 | rentry.co | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581738 |
Start date and time: | 2024-12-28 21:34:05 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 0s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | !Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@29/28@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63, 172.202.163.200
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 1852 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
15:34:59 | API Interceptor | |
15:35:40 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.37.209 | Get hash | malicious | IcedID | Browse |
| |
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
104.26.3.16 | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | Python Stealer, CStealer | Browse | |||
Get hash | malicious | XWorm | Browse | |||
Get hash | malicious | Babadeda | Browse | |||
Get hash | malicious | Python Stealer, CStealer | Browse | |||
Get hash | malicious | Python Stealer, CStealer | Browse | |||
Get hash | malicious | Xmrig | Browse | |||
Get hash | malicious | Unknown | Browse | |||
Get hash | malicious | Python Stealer, CStealer, Chaos | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
rentry.co | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com | Get hash | malicious | LummaC | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 496248 |
Entropy (8bit): | 7.999666539358623 |
Encrypted: | true |
SSDEEP: | 12288:PuuYPnblMBGjgrSn6caD4u0H2LKwAacxs8C4A9a44PknfCt9xK:GzPOt1caHq2SxVq94Pkf8K |
MD5: | 11A18CA5A4EC415EE2E991A8A2EFA60A |
SHA1: | AD7F7F4763644158A7D1DC22A25D7FA3600AC91F |
SHA-256: | 44A0272003274F673664E9EAC14FAE1BFC04DEBE7CB58A86A75E7C8D08033F20 |
SHA-512: | EF4C89749A69680DD5476AADAB0F0A56F5530B0EDA13CB5C432BF608084F48D6968586AD8DB954A860A55C973C466E1DDE3157CEDD49BD47044368DEC750E2C6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63488 |
Entropy (8bit): | 7.997218193561625 |
Encrypted: | true |
SSDEEP: | 1536:Bw4nxRC6h9dFUbZ+MsTogIPlC8aeu67NoURZDNMcI:HnxRpEbdWoxs8puuCaZD0 |
MD5: | CFCFA68F88E27612AB83EA57018A850C |
SHA1: | B403391DD50F8F6DD090E7E0319B611D9BBD2874 |
SHA-256: | C6A15A8FA80F99E5F34775677B74082A0946FCF2F10AD3827691059821F034F7 |
SHA-512: | 3B361BAF0F93B2F956BAB4EDB48E03A2AB06F2B61583E2A0D023B25C5D5E41A14074E2B7D007672CB63A8E44F25763649C847F338119B9E5FF203ED27AE98248 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.9976781651176445 |
Encrypted: | true |
SSDEEP: | 1536:cqVGA8XmJWQDjDhD3rvvbIRdb5gOY4kb+HUjnhM//6AiaPynUZTPb2RZU:c+X8XCdDjVD37v0RwOY4kiWnhM36iPSy |
MD5: | 32795C14E61648316037781CC1BA12C5 |
SHA1: | 4CA7E78E840E12EE1EC390C3996E1C75EFC5A248 |
SHA-256: | 9E938A13061086921E0961EF7D2F0A89A6B2B33E9D21A1EEC0198D878DF4E536 |
SHA-512: | 3A526AE9C35EE67F5AE951CEB927B8B2CE61EA4B03BEB5ECB941353CE6343A007857160DB689587EC34F712E7C9BC06918454DE73E3792F1F75CB671174BA35E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 6.652049318870944 |
Encrypted: | false |
SSDEEP: | 1536:QUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukC5HRu+OoU:Xnj0nEoXnmowS2u5hVOoU |
MD5: | 64ACFD91F0FC989008A694B9F199A57B |
SHA1: | 8E4E37288AC01A2F48FDF059A0CFC5135C935C17 |
SHA-256: | 6B0C1BB5546B6682CCE559D06DCA34D43A5208C30CEB0DCC18014E45F844E4B8 |
SHA-512: | 02ADE9009A4D732A82E3708374A4CD80319DD6F19AF67841D8246EA7BDD7BA6BEFDE911B9DA8BE9AC9929D12DE4EB8ED69AC965FC795293449E4545281A7F30D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 143360 |
Entropy (8bit): | 6.659217298088009 |
Encrypted: | false |
SSDEEP: | 3072:h0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNP:IbfSCOMVIPPL/sZ7HS3zcNP |
MD5: | 89B5A26508E16E2564552AE664E91B66 |
SHA1: | 9851FFCBE0015AA2210070E84D7058EA73EC84E4 |
SHA-256: | EAAF46C77B4F4F937A620D807D58D60882A0310978DBFFC32D469CB025DD45E1 |
SHA-512: | B5D1CCCC6C632D0138AAE3A6058BEBDDE6811F5CFCA986E36E790F690C7630E7B257E8C6680CE0A7A6A52D3C18CF395634BE5A96B66BE46C9A6A55BB1D35EF91 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 7.997169431224249 |
Encrypted: | true |
SSDEEP: | 1536:oSpmDzqM+54CRjeXU/4xbDjuNUAZy5NH+VOxI4+sdW1g:oSazq54CGUYbD6NXM5NegS45ig |
MD5: | 464B43F4D2DF8DF1A0D420A378B13284 |
SHA1: | 0C90A0656812B3EF827D920195C5C36841AE17AE |
SHA-256: | F0E44F93299CCE792814297DC2A34082B057FFCFBD7320C32B16598367A115E8 |
SHA-512: | 2D07B7C972873D397A9E4A16478C73C864F9C82D86D8EE8EE820BDED709CA3EE6B2C1E709DB52B01A131ED0BFF4881BC922D0BCFDEA512EE02D8A0513E7F1E26 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 22954 |
Entropy (8bit): | 5.07401746558717 |
Encrypted: | false |
SSDEEP: | 384:aGf05c6NMXKObw2tlbZqfiqViJYS94QBvO51PKmPb3i32jRsHEWF4Yh:aMpKObhl1qKm0p9rPmG2KFV |
MD5: | 2E7B0022580A56F4A6645D751E977BC1 |
SHA1: | 5F9942E6359BFEA8EA1407F69DFED3C308551238 |
SHA-256: | 3D616D0119732BF2780AF373845A9F8F1C50AED7CEA51D54E0E790FFEC75280E |
SHA-512: | 8887FE072570E5EDF9987F4FA01B115322D0BE0F7D3265911C91CF3DECC8370DF79BC5E09F5AA30E749A8299B313C1C3B4F7F79647C82D55B218D7171961CDAE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 22954 |
Entropy (8bit): | 5.07401746558717 |
Encrypted: | false |
SSDEEP: | 384:aGf05c6NMXKObw2tlbZqfiqViJYS94QBvO51PKmPb3i32jRsHEWF4Yh:aMpKObhl1qKm0p9rPmG2KFV |
MD5: | 2E7B0022580A56F4A6645D751E977BC1 |
SHA1: | 5F9942E6359BFEA8EA1407F69DFED3C308551238 |
SHA-256: | 3D616D0119732BF2780AF373845A9F8F1C50AED7CEA51D54E0E790FFEC75280E |
SHA-512: | 8887FE072570E5EDF9987F4FA01B115322D0BE0F7D3265911C91CF3DECC8370DF79BC5E09F5AA30E749A8299B313C1C3B4F7F79647C82D55B218D7171961CDAE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 7.996488555959393 |
Encrypted: | true |
SSDEEP: | 768:tJd3kcvzRbRlQP1WfW3xYgUdShSaLH4MyeoZGZkM1jufMxT6dZrdJ3:XRPq1WfoJ0abByT2ksjKQT6dZrdV |
MD5: | 7D627757A86D54CD1B6C057A7DBFCF26 |
SHA1: | 3A73D88A63ED284DDD76305A4D91DEB9275C4C39 |
SHA-256: | 3AAF7017767A1A1FBB1D9A80FA2C5B3C05583D879BE0A0E2F32898076A4D3BA7 |
SHA-512: | 4B43BAB09367F06C762E2BC60ED3452E05C7001B83198C6732BB68C146DECBE6C837891F597092DFE00565B895933ED94EB665AAC6A1CD4A49E9E26EED65986F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 6.679021710164866 |
Encrypted: | false |
SSDEEP: | 1536:S64qvI932eOypvcLSDOSpZ+Sh+I+FrbCyI7P4CxiL:J4qv+32eOyKODOSpQSAU4CI |
MD5: | 7D1725A7C164AD387FBA5007E60E47A7 |
SHA1: | C4253D862DFDBDB7EAE80F88E5487487E72C9AD4 |
SHA-256: | 03CDD5BDCB6EBCB6CFDB7D5C3A038C1BEACA34FC9C8FBB717BC85F31BBDB797A |
SHA-512: | 7368DF3D1AF7DE8CA3074ABCE8AB02C6DCD309F9B6818C6ACD4AEBB72985B64253AC66A74E424FDC317CF1B07108616C4636826393707109E2377B4586BEA4DE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 119808 |
Entropy (8bit): | 6.588797342871174 |
Encrypted: | false |
SSDEEP: | 3072:N7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOm:56AUkB0CThp6vmVnjphfhnS |
MD5: | CE605A59DE6379BA8DFAB762376A82DB |
SHA1: | 0E8D74F537E58AD09E08FB0AF0C2151FD91B953C |
SHA-256: | 81B6C9D8C798EEB2254ADE6E6A562C55F150198F97B25E550E4740594B679499 |
SHA-512: | 1DBC8184FFC8B5B90F6DEB2BF002364AECDDD779079A349EA875C73AC14BB63A482E23B7E2D201251CFF220081C0D1D069C826E638E9DA0EACCEEC723B867888 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488845 |
Entropy (8bit): | 7.998691987840986 |
Encrypted: | true |
SSDEEP: | 12288:XwvCK7QeZkkSjho8hd9kv+25MbW92VDfG4448L29:XEyBW8Nkv35MSYVTxPwA |
MD5: | AFA0F6F9328F080270E89AFFF0581506 |
SHA1: | 1C607C64FCA1CDB4E75DBFF2788F7C3B09D21EA6 |
SHA-256: | 40E274B995FF6326EB0F89943CF999743AE9BDA9F314B3D775F62EC71A5F51C2 |
SHA-512: | 1BE681C4CBA19297FA8D4C7339BD6C7F9E76098AFAC72B9283739DEC20B1A1F1444C71AD94BD29654E20E2CB788189969357CF9FF4284EBCB2A5958BCF166274 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 117760 |
Entropy (8bit): | 5.977012621747547 |
Encrypted: | false |
SSDEEP: | 1536:OxjgarB/5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ22:OxjgarB/5elDWy4ZNoGmROL7F1G7ho22 |
MD5: | D036147EA7B09A642723D8811105937D |
SHA1: | 276CC8C1DDA5D55F549E053522F95CEE037F6B9D |
SHA-256: | DC830AFFB9D9B2E23293BEDA376AD0BDA96CDFF3670CD10ACD131FDCC795855E |
SHA-512: | B23E9E6A86720D1E37399916F66A13612CA570884D84F89383563E30479C37F6D48FB0859220F027E68A29D568B5AF78360112C06EE89BA347145E9AB48F3CF5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 109568 |
Entropy (8bit): | 6.268600966580074 |
Encrypted: | false |
SSDEEP: | 3072:GZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3lap:GK5vPeDkjGgQaE/lS |
MD5: | CD16A7A04781F568A2EC3AC1A39FED9C |
SHA1: | 37096520C4625AA474494B9C2A10BF31DE8B673D |
SHA-256: | 5863794AC1CC6542B2BEE5E8A5CF372C386DB7F2840295B902B1E3B88751A9B6 |
SHA-512: | 6FB5658A18742FE5428A89E06E7EC0B3AE07658329CDA5FB8F0801356648D992A9C11F9E26D2468E7153665C8F3D626151256336617037B7B5F6BF3B0ED6777A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997843169471513 |
Encrypted: | true |
SSDEEP: | 1536:SohxbClN1Bzx9wpidSop7s9FJ8ejlM+wd/zJP7vxugTGMOZ1e:SoraBzPPdS/9XfwpzJP7Jugqj1e |
MD5: | CC9CC6F20A1EA21EA470B504FDE0F90C |
SHA1: | 1E7AFADF12F7A09A68C93BA813C64C2C9B225E71 |
SHA-256: | 2F9D2D953CCFEDDD5DEC2DF0BC5134F002F44F31715BD812F81875CDF6B550A6 |
SHA-512: | 64C4E6ED40C401BF82ADE85189E7E862F7817965F2739FB7C93B7C2A6FD4B4959585BAF05EEB1E4A21E5F665E64709C3FA670AAE5CA1EE2B7927E7FE1E4D3824 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 5.077087329848572 |
Encrypted: | false |
SSDEEP: | 768:xhSaAwuXc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUs6:eaAwusPdKaj6iTcPAsA+ |
MD5: | B99AD1F5C7742F52686D2508FD00982A |
SHA1: | 7B0449CADAF6A2A28DBF7E65FD45A1FD12EDDB48 |
SHA-256: | AC58BF2BC9334DD912148161F79DC611A7326465CF959F7374F387E8AFC61B42 |
SHA-512: | 78397576FA9CD90C7B8EA8ECE2F5B31887F5E5EB6D5A3C6FB69E4BA2554B14286142D68DB2F6DEEC4C21AD28B8148A89494154F65CE36F24EEA793EB3D96F472 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 895 |
Entropy (8bit): | 3.529004704992108 |
Encrypted: | false |
SSDEEP: | 12:oLOyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1:oiyGS9PvCA433C+sCNC1 |
MD5: | 9FA6250AC33B492A0812FC44C12A8A0C |
SHA1: | B4277E0D18E4FDB16B4437F0803BB6E04438A162 |
SHA-256: | 26A3D1D787256EDD456A7E86452AD615AD8AEA98C58F8ECEA9EE4978F62D02DE |
SHA-512: | FFE0CD06A9BD86E673A0D92E3C7FB87A2E50A80B40C4716EE224264F9BE8A4E32F78E86F38E38156AD40CA8D987537CB65B9B9DDA86BFEF2FDBB9AD0CB836E52 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 6.691860814252206 |
Encrypted: | false |
SSDEEP: | 1536:82U0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvYd:82UDQWf05mjccBiqXvpgb |
MD5: | 85667E167580AB6EE879A397EC8378D5 |
SHA1: | 3C22100369DD7E9FC15788182A7647CC18A12EC8 |
SHA-256: | FAB0E8057B43711FDCF24AB3BB355B5CBC3F3D37782E598BF4925AB58E602E74 |
SHA-512: | 398C52BEC5B244353715BC4A044415DB5A542BB9EF8C98D4C425BAEA55E2BDC0946753C5AE1775A950FB1FC2F2F3119243178D58F3230873A77086BB4FFF31D4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.996655669830848 |
Encrypted: | true |
SSDEEP: | 1536:VklthqG33QEqywJCsrUvekJ9dVLw45uRY4hUfrR:V23AEVwEfJ9XLw45riUfrR |
MD5: | 76D9165FFF95E5302786C486398E284B |
SHA1: | ABE552EE6A06100D96AEFC6F2AF6E189AA766227 |
SHA-256: | 1B5A2E903DEC1BD0620E473D0DFF69761ACF5E375EAC1ED87ADF76F36F2386A3 |
SHA-512: | 6CC547E452FDA1A60FBFB016027791788B23C3591114D7800B244ABA620717DF5A72B5CA1C98AA1355CA2C8B0E7395C04EC072DB9606540051FD99B1846FB198 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144384 |
Entropy (8bit): | 6.466063523256831 |
Encrypted: | false |
SSDEEP: | 3072:PDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbI:GO5bLezWWt/Dd314V14ZgP0JaAOz04pC |
MD5: | 57B6E79E7402D37A0B83CFF2DB1D0273 |
SHA1: | 8805DF3CABF590F92B2ECB7EFAE60D82F14F0B6F |
SHA-256: | 8DF20B2B819AA0C6E36877BA7063FED41274B988C46C28EC7E4B3C72584EC2E7 |
SHA-512: | 49EAFE0D09F850C52006C3DF4DD58E2D4CE1D6AA22AA7A378D6345AB6FE7C92987E134E4C486DEF75E6B0219D867AE1229AA828440C5624EF8C93C7CC1E79DAF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.997185886941614 |
Encrypted: | true |
SSDEEP: | 1536:bvgT0gwThL3g9hMNG6HNnBAcmSJU3VXkxf3nZ9rY47K0qMLE9S7f:bvgABhL32wHNn6cBgX+brY47K0qqtf |
MD5: | 34BE2CF79F42494DB963EC85DA206D2E |
SHA1: | 2713983B0B393CFF8E07630B1ABC107FE90BDC5B |
SHA-256: | 7CFB013FACCD6086F660D5B46712EBACABF2A160A26E453A7B83D83412A16A11 |
SHA-512: | 47CD4E47A69059235607B95342E069CCD7C8E41F7D6D9E1DDC9BF5F93BC8C7A064A49EDC26ADC41CCD3F24B5515E965D3E9CAAC391D345D3D5209C6ADEDD61CB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Setup.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34424 |
Entropy (8bit): | 7.994339551631228 |
Encrypted: | true |
SSDEEP: | 768:VCFeeq+5DGzH8CfNr7GfSLnANmqrfy10Uy/hrMBohg9:VCFeeQBlr7GKzaXy0UyZrK |
MD5: | F0067E491667E285C6AA36CABB0934F0 |
SHA1: | 05F07BC57272ACEA6794F92726B6B05AC4BF41EA |
SHA-256: | 7C27FA3805B5877F74A80274B3ACCFF8041CFCB5C8FF930DE5B93F49569A9C8E |
SHA-512: | FFDAD8684222F1E957A8E64DF94EE6DEA74BE948E8ABA9C759B5995B8337A9C1F363C1B098D32C393DC69D7470C9BA2E748E4D057F3FE89E6F4C99B02DE2F9AF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7390 |
Entropy (8bit): | 7.597721493375944 |
Encrypted: | false |
SSDEEP: | 192:bH6N8VEVFJ84kcGNq4/C+Q3ISVSWMZMQ3rw:brVEVFJ8ZcGwGBk7/UMQ3rw |
MD5: | 117FE1670C955271C9D468192301A43F |
SHA1: | 46E5D4E2284C95B30D8D5C8C506A5376987B70A6 |
SHA-256: | 4C4FD142141A03A04B927A31F365DFB0ACD6F972340B109430AF367EAA2856ED |
SHA-512: | 1BECFB8DDE3672C2A6FBD33BE641CD0E15852365AD2DEED41700F3C441BE90F691B564AE947813A04D19665E9B39AC17F73B1A7EFB54CE8B4821B0A25D2DCEF9 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.6599547231656377 |
Encrypted: | false |
SSDEEP: | 3:NlllulRlltl:NllU |
MD5: | 2AAC5546A51052C82C51A111418615EB |
SHA1: | 14CFBEF3B3D238893C68F1BD6FE985DACF1953F1 |
SHA-256: | DBBA7151765EDB3661C0B1AD08037C0BDDC43227D2F2E8DDAC33C4A1E7C4151F |
SHA-512: | 1273F4B0365E213134E7FBC3BE45CAC33CB32AB6CED85479905C702F0429A0491A5E9C878E5FEFFA05BB0D1AA7F704949D13DD1DA9FCEB93665F1CC110FB24B8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
File Type: | |
Category: | dropped |
Size (bytes): | 5659 |
Entropy (8bit): | 5.039280615096417 |
Encrypted: | false |
SSDEEP: | 96:5puA5jKEcXrj7uDQgzds4x3pBxu04nx/ICu:5p9pcXr2DFze4x3pBIHnx/ju |
MD5: | B417EB3353C5375A9FD8CDE2774CFA7F |
SHA1: | ABF9585C8DB4CE18762C52584D40B065EB813C8A |
SHA-256: | 8C20C24FCBA84BB4950B653CB00CDD8AC801CE4C27CFA4CBD42E690D6B356AEB |
SHA-512: | C2176B85CC373D271BD7A1F49A64B36034987927634E4D8B84105D79788C5EC47FAEBBF46CE8D2C0E33D99AEAFF07B2FA078BA9FFB8514B8EC6B8030E85F055B |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.895386354455606 |
TrID: |
|
File name: | !Setup.exe |
File size: | 14'692'191 bytes |
MD5: | cb8f02134e7a9e082e0d9bf4c988b202 |
SHA1: | c4a32f3385e1b91d135d2f713779299bdb6d0ab0 |
SHA256: | 2b5fdba3647700d3dde718e3b43fde8c12f3425d0ab768d446450deeb1a3de33 |
SHA512: | e1bb2da52c92c2834a4225574adaccf7d960b6be9d846578521d3204b465710cb10dd184859a36f004c4acd761844741cab84a363682a42a4d7e17b6cd6a6144 |
SSDEEP: | 24576:oRVUf5F4PCxULgB/88cv15mKLTanYE2caHvdzzfn2ex:d5gcB/88cDPLT0i9f2ex |
TLSH: | 64E6C43033FCD43DD95608C1EA91B6D3A667E6E1B483506CA2588EED31B350DBE5CB68 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8..... |
Icon Hash: | e899b89cfa1a7810 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 0D637B42FF0AB3019673C4243305BD25 |
Thumbprint SHA-1: | 777A41024CF413CCB49B3434565545C0D78D80E9 |
Thumbprint SHA-256: | 3A0A9BD3CBF08E350DACBFCB54C53F00113D929DAD01AF4C9D5BFE37ACF9F352 |
Serial: | 062EE3FD7CDC52097C1DA6AFA87C745E |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007FDA888AFD4Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007FDA888AFA2Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007FDA888AFA1Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007FDA888AD31Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007FDA888AF6F1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FDA888AD3A3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FDA888AD31Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x66e2 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xe0002f | 0x2f30 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x66e2 | 0x6800 | aced79e902ae27a028330595bd1eb48c | False | 0.65478515625 | data | 6.072590767394516 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x107000 | 0xfd6 | 0x1000 | 98b5852fe7cbf1ae227944ba00d536ab | False | 0.567626953125 | data | 5.312168663390484 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x100268 | 0x1f50 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0013722554890219 |
RT_ICON | 0x1021b8 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.4860659072416599 |
RT_ICON | 0x104820 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.5398451730418944 |
RT_ICON | 0x105948 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.650709219858156 |
RT_DIALOG | 0x105db0 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x105eb0 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x105fcc | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x10602c | 0x3e | data | English | United States | 0.8225806451612904 |
RT_VERSION | 0x10606c | 0x3a0 | data | English | United States | 0.4105603448275862 |
RT_MANIFEST | 0x10640c | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:52.982519+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:53.839595+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:53.839595+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:55.105526+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:55.897918+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:55.897918+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:35:57.741369+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:00.002405+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49747 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:02.211154+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49753 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:04.685957+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49759 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:05.504971+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49759 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:07.125925+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49765 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:10.815856+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49774 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:11.594130+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49774 | 104.21.37.209 | 443 | TCP |
2024-12-28T21:36:13.030490+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49779 | 104.26.3.16 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 21:35:51.668456078 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:51.668497086 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:51.668764114 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:51.672116041 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:51.672143936 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:52.982444048 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:52.982518911 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:52.987103939 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:52.987112045 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:52.987339973 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.039464951 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.067199945 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.067219019 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.067280054 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.839585066 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.839663029 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.839716911 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.841383934 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.841404915 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.841414928 CET | 49737 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.841420889 CET | 443 | 49737 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.848247051 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.848272085 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:53.848373890 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.848623991 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:53.848632097 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.105421066 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.105525970 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.112876892 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.112884998 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.113081932 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.114171028 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.114191055 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.114229918 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.897921085 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.897985935 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.898013115 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.898032904 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.898042917 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.898077011 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.898082972 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.898169041 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.898206949 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.898211956 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.914756060 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.914803982 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.914810896 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.922960997 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.923022032 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:55.923057079 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:55.976964951 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.099124908 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103002071 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103091955 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103190899 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.103213072 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103264093 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.103283882 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103420973 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103435993 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.103450060 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103471041 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.103477001 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.103496075 CET | 49738 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.103499889 CET | 443 | 49738 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.483938932 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.483983994 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:56.484042883 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.484364033 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:56.484376907 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:57.741296053 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:57.741369009 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:57.742533922 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:57.742547035 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:57.742748022 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:57.745794058 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:57.745933056 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:57.745976925 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:57.746047020 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:57.746056080 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:58.720674992 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:58.720746040 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:58.720798969 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:58.721009970 CET | 49740 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:58.721024036 CET | 443 | 49740 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:58.742230892 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:58.742257118 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:35:58.742347956 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:58.744616985 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:35:58.744623899 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.002326965 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.002404928 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.003612041 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.003638983 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.004085064 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.005491018 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.005594015 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.005611897 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.872997999 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.873075008 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.873152971 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.873347998 CET | 49747 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.873357058 CET | 443 | 49747 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.950428009 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.950455904 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:00.950529099 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.950814009 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:00.950825930 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:02.211045980 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:02.211153984 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:02.212357044 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:02.212366104 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:02.212560892 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:02.213895082 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:02.214072943 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:02.214101076 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:02.214163065 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:02.214171886 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:03.194732904 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:03.194813013 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:03.194864035 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:03.195178986 CET | 49753 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:03.195185900 CET | 443 | 49753 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:03.427989006 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:03.428049088 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:03.428123951 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:03.428388119 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:03.428423882 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:04.685878038 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:04.685956955 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:04.687058926 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:04.687063932 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:04.687273979 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:04.688379049 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:04.688473940 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:04.688486099 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:05.504987001 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:05.505068064 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:05.505117893 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:05.505228043 CET | 49759 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:05.505254030 CET | 443 | 49759 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:05.814589977 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:05.814663887 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:05.814745903 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:05.815056086 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:05.815073967 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.125750065 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.125925064 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.126933098 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.126946926 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.127443075 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.128505945 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.129059076 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.129092932 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.129193068 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.129229069 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.129600048 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.129642010 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.133330107 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.133363962 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.134535074 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.134568930 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.138540983 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.138570070 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.138580084 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.138592958 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.138736010 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.138758898 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.138778925 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.141263962 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.141295910 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.179383039 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.180107117 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.180146933 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.180176020 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.180188894 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:07.180210114 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:07.180226088 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:09.551875114 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:09.551958084 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:09.554455042 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:09.554517984 CET | 49765 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:09.554526091 CET | 443 | 49765 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:09.555819035 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:09.555849075 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:09.555994987 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:09.556211948 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:09.556225061 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:10.815774918 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:10.815855980 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:10.826842070 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:10.826854944 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:10.827112913 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:10.843421936 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:10.843460083 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:10.843483925 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:11.593997955 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:11.594070911 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:11.594199896 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:11.594304085 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:11.594316006 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:11.594327927 CET | 49774 | 443 | 192.168.2.4 | 104.21.37.209 |
Dec 28, 2024 21:36:11.594332933 CET | 443 | 49774 | 104.21.37.209 | 192.168.2.4 |
Dec 28, 2024 21:36:11.816576958 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:11.816598892 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:11.816683054 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:11.817102909 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:11.817116022 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.030361891 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.030489922 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.031907082 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.031915903 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.032114029 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.033128977 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.079338074 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808465958 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808506966 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808533907 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808562040 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808578968 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.808593988 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808614016 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.808659077 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.808938980 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.809072018 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.809078932 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Dec 28, 2024 21:36:13.809098005 CET | 49779 | 443 | 192.168.2.4 | 104.26.3.16 |
Dec 28, 2024 21:36:13.809102058 CET | 443 | 49779 | 104.26.3.16 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 21:35:05.242790937 CET | 53268 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 28, 2024 21:35:05.458297968 CET | 53 | 53268 | 1.1.1.1 | 192.168.2.4 |
Dec 28, 2024 21:35:51.340529919 CET | 56784 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 28, 2024 21:35:51.663081884 CET | 53 | 56784 | 1.1.1.1 | 192.168.2.4 |
Dec 28, 2024 21:36:11.596662045 CET | 52094 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 28, 2024 21:36:11.815766096 CET | 53 | 52094 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 28, 2024 21:35:05.242790937 CET | 192.168.2.4 | 1.1.1.1 | 0xce49 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:35:51.340529919 CET | 192.168.2.4 | 1.1.1.1 | 0x77a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:36:11.596662045 CET | 192.168.2.4 | 1.1.1.1 | 0x91a8 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 28, 2024 21:35:05.458297968 CET | 1.1.1.1 | 192.168.2.4 | 0xce49 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:35:51.663081884 CET | 1.1.1.1 | 192.168.2.4 | 0x77a8 | No error (0) | 104.21.37.209 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:35:51.663081884 CET | 1.1.1.1 | 192.168.2.4 | 0x77a8 | No error (0) | 172.67.213.115 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:11.815766096 CET | 1.1.1.1 | 192.168.2.4 | 0x91a8 | No error (0) | 104.26.3.16 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:11.815766096 CET | 1.1.1.1 | 192.168.2.4 | 0x91a8 | No error (0) | 104.26.2.16 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:11.815766096 CET | 1.1.1.1 | 192.168.2.4 | 0x91a8 | No error (0) | 172.67.75.40 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49737 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:35:53 UTC | 264 | OUT | |
2024-12-28 20:35:53 UTC | 8 | OUT | |
2024-12-28 20:35:53 UTC | 1137 | IN | |
2024-12-28 20:35:53 UTC | 7 | IN | |
2024-12-28 20:35:53 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:35:55 UTC | 265 | OUT | |
2024-12-28 20:35:55 UTC | 49 | OUT | |
2024-12-28 20:35:55 UTC | 1133 | IN | |
2024-12-28 20:35:55 UTC | 236 | IN | |
2024-12-28 20:35:55 UTC | 898 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN | |
2024-12-28 20:35:55 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:35:57 UTC | 275 | OUT | |
2024-12-28 20:35:57 UTC | 15331 | OUT | |
2024-12-28 20:35:57 UTC | 2786 | OUT | |
2024-12-28 20:35:58 UTC | 1141 | IN | |
2024-12-28 20:35:58 UTC | 20 | IN | |
2024-12-28 20:35:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49747 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:00 UTC | 276 | OUT | |
2024-12-28 20:36:00 UTC | 8750 | OUT | |
2024-12-28 20:36:00 UTC | 1135 | IN | |
2024-12-28 20:36:00 UTC | 20 | IN | |
2024-12-28 20:36:00 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49753 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:02 UTC | 284 | OUT | |
2024-12-28 20:36:02 UTC | 15331 | OUT | |
2024-12-28 20:36:02 UTC | 5114 | OUT | |
2024-12-28 20:36:03 UTC | 1145 | IN | |
2024-12-28 20:36:03 UTC | 20 | IN | |
2024-12-28 20:36:03 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49759 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:04 UTC | 282 | OUT | |
2024-12-28 20:36:04 UTC | 1226 | OUT | |
2024-12-28 20:36:05 UTC | 1134 | IN | |
2024-12-28 20:36:05 UTC | 20 | IN | |
2024-12-28 20:36:05 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49765 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:07 UTC | 285 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:07 UTC | 15331 | OUT | |
2024-12-28 20:36:09 UTC | 1135 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49774 | 104.21.37.209 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:10 UTC | 265 | OUT | |
2024-12-28 20:36:10 UTC | 84 | OUT | |
2024-12-28 20:36:11 UTC | 1125 | IN | |
2024-12-28 20:36:11 UTC | 126 | IN | |
2024-12-28 20:36:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49779 | 104.26.3.16 | 443 | 7800 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:13 UTC | 196 | OUT | |
2024-12-28 20:36:13 UTC | 916 | IN | |
2024-12-28 20:36:13 UTC | 453 | IN | |
2024-12-28 20:36:13 UTC | 1369 | IN | |
2024-12-28 20:36:13 UTC | 1369 | IN | |
2024-12-28 20:36:13 UTC | 1369 | IN | |
2024-12-28 20:36:13 UTC | 1106 | IN | |
2024-12-28 20:36:13 UTC | 6 | IN | |
2024-12-28 20:36:13 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:34:58 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\Desktop\!Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 14'692'191 bytes |
MD5 hash: | CB8F02134E7A9E082E0D9BF4C988B202 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 15:34:59 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 15:34:59 |
Start date: | 28/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 15:35:01 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd20000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 15:35:01 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 15:35:02 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd20000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 15:35:02 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 15:35:02 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 15:35:02 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x910000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 15:35:02 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x160000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1a0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x300000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 15:36:12 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x990000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 15:36:12 |
Start date: | 28/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.9% |
Total number of Nodes: | 1481 |
Total number of Limit Nodes: | 25 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 12.3, APIs: 5, Strings: 2, Instructions: 40timeCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04003FA0 Relevance: .5, Instructions: 536COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04003010 Relevance: .1, Instructions: 74COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04003000 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0071D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F5164E Relevance: .0, Instructions: 40COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0071D01C Relevance: .0, Instructions: 36COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F50148 Relevance: 9.1, Strings: 7, Instructions: 326COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 06F52C10 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|