Windows
Analysis Report
!Set-up..exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- !Set-up..exe (PID: 6112 cmdline:
"C:\Users\ user\Deskt op\!Set-up ..exe" MD5: 27968EEBCB115C6ECB62199A98CE9EE6) - cmd.exe (PID: 5788 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ca mpaigns Ca mpaigns.cm d & Campai gns.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 4012 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 5744 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 5436 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 6564 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 6584 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6556 cmdline:
cmd /c md 71992 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 6568 cmdline:
extrac32 / Y /E Ec MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 3356 cmdline:
findstr /V "Ratio" R eturning MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 6984 cmdline:
cmd /c cop y /b 71992 \Banned.co m + Fwd + Rise + Des igned + Ba lanced + A vailable + Dir + Soc cer + Race + Ford + Writing 71 992\Banned .com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1788 cmdline:
cmd /c cop y /b ..\Bi ds + ..\Ce o + ..\Thr oat + ..\H all + ..\A ccess + .. \Availabil ity + ..\S cout + ..\ War V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Banned.com (PID: 6460 cmdline:
Banned.com V MD5: 62D09F076E6E0240548C2F837536A46A) - powershell.exe (PID: 6516 cmdline:
powershell -exec byp ass -f "C: \Users\use r\AppData\ Local\Temp \Z0C5PJM9U IPTPTUO9KX ONZLNPXS.p s1" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 6536 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - choice.exe (PID: 3224 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Daniel Bohannon (idea), Roberto Rodriguez (Fix): |
Source: | Author: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: |
Source: | Author: frack113: |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:56.856378+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:59.109107+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:01.379888+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49797 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:03.672548+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49803 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:05.830553+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49809 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:08.201372+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49815 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:10.507535+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49821 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:13.624453+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49831 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:15.857196+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.5 | 49836 | 172.67.75.40 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:57.889164+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:59.860017+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:14.406950+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.5 | 49831 | 172.67.213.115 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:57.889164+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:59.860017+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:36:04.494462+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.5 | 49803 | 172.67.213.115 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | DNS query: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050F9 |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004038AF |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040737E | |
Source: | Code function: | 0_2_00406EFE | |
Source: | Code function: | 0_2_004079A2 | |
Source: | Code function: | 0_2_004049A8 |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044D1 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | Virustotal: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | File opened: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_00406328 |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread delayed: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior | ||
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: |
Source: | Code function: | 0_2_00406301 | |
Source: | Code function: | 0_2_00406CC7 |
Source: | Thread delayed: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00406328 |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406831 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 111 Masquerading | 2 OS Credential Dumping | 21 Security Software Discovery | Remote Services | 11 Input Capture | 1 Web Service | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 221 Virtualization/Sandbox Evasion | 11 Input Capture | 3 Process Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 221 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 1 Ingress Tool Transfer | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 1 Application Window Discovery | Distributed Component Object Model | 1 Clipboard Data | 3 Non-Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 13 File and Directory Discovery | SSH | Keylogging | 14 Application Layer Protocol | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 25 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
15% | Virustotal | Browse | ||
16% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fallyjustif.click | 172.67.213.115 | true | true | unknown | |
rentry.co | 172.67.75.40 | true | false | high | |
xhWaXURTqNAudpSlyMZZXaDi.xhWaXURTqNAudpSlyMZZXaDi | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
false | high | ||
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.213.115 | fallyjustif.click | United States | 13335 | CLOUDFLARENETUS | true | |
172.67.75.40 | rentry.co | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1581739 |
Start date and time: | 2024-12-28 21:34:11 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 41s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 19 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | !Set-up..exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@29/28@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63, 172.202.163.200
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target powershell.exe, PID 6516 because it is empty
- Not all processes where analyzed, report is missing behavior information
- Report size exceeded maximum capacity and may have missing behavior information.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
15:35:01 | API Interceptor | |
15:35:42 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.213.115 | Get hash | malicious | IcedID | Browse |
| |
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
Get hash | malicious | IcedID | Browse |
| ||
172.67.75.40 | Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
rentry.co | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | AsyncRAT, XWorm | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | CobaltStrike, Metasploit | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 496248 |
Entropy (8bit): | 7.999666539358623 |
Encrypted: | true |
SSDEEP: | 12288:PuuYPnblMBGjgrSn6caD4u0H2LKwAacxs8C4A9a44PknfCt9xK:GzPOt1caHq2SxVq94Pkf8K |
MD5: | 11A18CA5A4EC415EE2E991A8A2EFA60A |
SHA1: | AD7F7F4763644158A7D1DC22A25D7FA3600AC91F |
SHA-256: | 44A0272003274F673664E9EAC14FAE1BFC04DEBE7CB58A86A75E7C8D08033F20 |
SHA-512: | EF4C89749A69680DD5476AADAB0F0A56F5530B0EDA13CB5C432BF608084F48D6968586AD8DB954A860A55C973C466E1DDE3157CEDD49BD47044368DEC750E2C6 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 63488 |
Entropy (8bit): | 7.997218193561625 |
Encrypted: | true |
SSDEEP: | 1536:Bw4nxRC6h9dFUbZ+MsTogIPlC8aeu67NoURZDNMcI:HnxRpEbdWoxs8puuCaZD0 |
MD5: | CFCFA68F88E27612AB83EA57018A850C |
SHA1: | B403391DD50F8F6DD090E7E0319B611D9BBD2874 |
SHA-256: | C6A15A8FA80F99E5F34775677B74082A0946FCF2F10AD3827691059821F034F7 |
SHA-512: | 3B361BAF0F93B2F956BAB4EDB48E03A2AB06F2B61583E2A0D023B25C5D5E41A14074E2B7D007672CB63A8E44F25763649C847F338119B9E5FF203ED27AE98248 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.9976781651176445 |
Encrypted: | true |
SSDEEP: | 1536:cqVGA8XmJWQDjDhD3rvvbIRdb5gOY4kb+HUjnhM//6AiaPynUZTPb2RZU:c+X8XCdDjVD37v0RwOY4kiWnhM36iPSy |
MD5: | 32795C14E61648316037781CC1BA12C5 |
SHA1: | 4CA7E78E840E12EE1EC390C3996E1C75EFC5A248 |
SHA-256: | 9E938A13061086921E0961EF7D2F0A89A6B2B33E9D21A1EEC0198D878DF4E536 |
SHA-512: | 3A526AE9C35EE67F5AE951CEB927B8B2CE61EA4B03BEB5ECB941353CE6343A007857160DB689587EC34F712E7C9BC06918454DE73E3792F1F75CB671174BA35E |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 56320 |
Entropy (8bit): | 6.652049318870944 |
Encrypted: | false |
SSDEEP: | 1536:QUn9r5C03Eq30BcrTrhCX4aVmoJiKwtk2ukC5HRu+OoU:Xnj0nEoXnmowS2u5hVOoU |
MD5: | 64ACFD91F0FC989008A694B9F199A57B |
SHA1: | 8E4E37288AC01A2F48FDF059A0CFC5135C935C17 |
SHA-256: | 6B0C1BB5546B6682CCE559D06DCA34D43A5208C30CEB0DCC18014E45F844E4B8 |
SHA-512: | 02ADE9009A4D732A82E3708374A4CD80319DD6F19AF67841D8246EA7BDD7BA6BEFDE911B9DA8BE9AC9929D12DE4EB8ED69AC965FC795293449E4545281A7F30D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 143360 |
Entropy (8bit): | 6.659217298088009 |
Encrypted: | false |
SSDEEP: | 3072:h0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNP:IbfSCOMVIPPL/sZ7HS3zcNP |
MD5: | 89B5A26508E16E2564552AE664E91B66 |
SHA1: | 9851FFCBE0015AA2210070E84D7058EA73EC84E4 |
SHA-256: | EAAF46C77B4F4F937A620D807D58D60882A0310978DBFFC32D469CB025DD45E1 |
SHA-512: | B5D1CCCC6C632D0138AAE3A6058BEBDDE6811F5CFCA986E36E790F690C7630E7B257E8C6680CE0A7A6A52D3C18CF395634BE5A96B66BE46C9A6A55BB1D35EF91 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64512 |
Entropy (8bit): | 7.997169431224249 |
Encrypted: | true |
SSDEEP: | 1536:oSpmDzqM+54CRjeXU/4xbDjuNUAZy5NH+VOxI4+sdW1g:oSazq54CGUYbD6NXM5NegS45ig |
MD5: | 464B43F4D2DF8DF1A0D420A378B13284 |
SHA1: | 0C90A0656812B3EF827D920195C5C36841AE17AE |
SHA-256: | F0E44F93299CCE792814297DC2A34082B057FFCFBD7320C32B16598367A115E8 |
SHA-512: | 2D07B7C972873D397A9E4A16478C73C864F9C82D86D8EE8EE820BDED709CA3EE6B2C1E709DB52B01A131ED0BFF4881BC922D0BCFDEA512EE02D8A0513E7F1E26 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 22954 |
Entropy (8bit): | 5.07401746558717 |
Encrypted: | false |
SSDEEP: | 384:aGf05c6NMXKObw2tlbZqfiqViJYS94QBvO51PKmPb3i32jRsHEWF4Yh:aMpKObhl1qKm0p9rPmG2KFV |
MD5: | 2E7B0022580A56F4A6645D751E977BC1 |
SHA1: | 5F9942E6359BFEA8EA1407F69DFED3C308551238 |
SHA-256: | 3D616D0119732BF2780AF373845A9F8F1C50AED7CEA51D54E0E790FFEC75280E |
SHA-512: | 8887FE072570E5EDF9987F4FA01B115322D0BE0F7D3265911C91CF3DECC8370DF79BC5E09F5AA30E749A8299B313C1C3B4F7F79647C82D55B218D7171961CDAE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 22954 |
Entropy (8bit): | 5.07401746558717 |
Encrypted: | false |
SSDEEP: | 384:aGf05c6NMXKObw2tlbZqfiqViJYS94QBvO51PKmPb3i32jRsHEWF4Yh:aMpKObhl1qKm0p9rPmG2KFV |
MD5: | 2E7B0022580A56F4A6645D751E977BC1 |
SHA1: | 5F9942E6359BFEA8EA1407F69DFED3C308551238 |
SHA-256: | 3D616D0119732BF2780AF373845A9F8F1C50AED7CEA51D54E0E790FFEC75280E |
SHA-512: | 8887FE072570E5EDF9987F4FA01B115322D0BE0F7D3265911C91CF3DECC8370DF79BC5E09F5AA30E749A8299B313C1C3B4F7F79647C82D55B218D7171961CDAE |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 7.996488555959393 |
Encrypted: | true |
SSDEEP: | 768:tJd3kcvzRbRlQP1WfW3xYgUdShSaLH4MyeoZGZkM1jufMxT6dZrdJ3:XRPq1WfoJ0abByT2ksjKQT6dZrdV |
MD5: | 7D627757A86D54CD1B6C057A7DBFCF26 |
SHA1: | 3A73D88A63ED284DDD76305A4D91DEB9275C4C39 |
SHA-256: | 3AAF7017767A1A1FBB1D9A80FA2C5B3C05583D879BE0A0E2F32898076A4D3BA7 |
SHA-512: | 4B43BAB09367F06C762E2BC60ED3452E05C7001B83198C6732BB68C146DECBE6C837891F597092DFE00565B895933ED94EB665AAC6A1CD4A49E9E26EED65986F |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 6.679021710164866 |
Encrypted: | false |
SSDEEP: | 1536:S64qvI932eOypvcLSDOSpZ+Sh+I+FrbCyI7P4CxiL:J4qv+32eOyKODOSpQSAU4CI |
MD5: | 7D1725A7C164AD387FBA5007E60E47A7 |
SHA1: | C4253D862DFDBDB7EAE80F88E5487487E72C9AD4 |
SHA-256: | 03CDD5BDCB6EBCB6CFDB7D5C3A038C1BEACA34FC9C8FBB717BC85F31BBDB797A |
SHA-512: | 7368DF3D1AF7DE8CA3074ABCE8AB02C6DCD309F9B6818C6ACD4AEBB72985B64253AC66A74E424FDC317CF1B07108616C4636826393707109E2377B4586BEA4DE |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 119808 |
Entropy (8bit): | 6.588797342871174 |
Encrypted: | false |
SSDEEP: | 3072:N7t8T6pUkBJR8CThpmESv+AqVnBypIbv18mLthfhnueoMmOm:56AUkB0CThp6vmVnjphfhnS |
MD5: | CE605A59DE6379BA8DFAB762376A82DB |
SHA1: | 0E8D74F537E58AD09E08FB0AF0C2151FD91B953C |
SHA-256: | 81B6C9D8C798EEB2254ADE6E6A562C55F150198F97B25E550E4740594B679499 |
SHA-512: | 1DBC8184FFC8B5B90F6DEB2BF002364AECDDD779079A349EA875C73AC14BB63A482E23B7E2D201251CFF220081C0D1D069C826E638E9DA0EACCEEC723B867888 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 488845 |
Entropy (8bit): | 7.998691987840986 |
Encrypted: | true |
SSDEEP: | 12288:XwvCK7QeZkkSjho8hd9kv+25MbW92VDfG4448L29:XEyBW8Nkv35MSYVTxPwA |
MD5: | AFA0F6F9328F080270E89AFFF0581506 |
SHA1: | 1C607C64FCA1CDB4E75DBFF2788F7C3B09D21EA6 |
SHA-256: | 40E274B995FF6326EB0F89943CF999743AE9BDA9F314B3D775F62EC71A5F51C2 |
SHA-512: | 1BE681C4CBA19297FA8D4C7339BD6C7F9E76098AFAC72B9283739DEC20B1A1F1444C71AD94BD29654E20E2CB788189969357CF9FF4284EBCB2A5958BCF166274 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 117760 |
Entropy (8bit): | 5.977012621747547 |
Encrypted: | false |
SSDEEP: | 1536:OxjgarB/5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ22:OxjgarB/5elDWy4ZNoGmROL7F1G7ho22 |
MD5: | D036147EA7B09A642723D8811105937D |
SHA1: | 276CC8C1DDA5D55F549E053522F95CEE037F6B9D |
SHA-256: | DC830AFFB9D9B2E23293BEDA376AD0BDA96CDFF3670CD10ACD131FDCC795855E |
SHA-512: | B23E9E6A86720D1E37399916F66A13612CA570884D84F89383563E30479C37F6D48FB0859220F027E68A29D568B5AF78360112C06EE89BA347145E9AB48F3CF5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 109568 |
Entropy (8bit): | 6.268600966580074 |
Encrypted: | false |
SSDEEP: | 3072:GZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3lap:GK5vPeDkjGgQaE/lS |
MD5: | CD16A7A04781F568A2EC3AC1A39FED9C |
SHA1: | 37096520C4625AA474494B9C2A10BF31DE8B673D |
SHA-256: | 5863794AC1CC6542B2BEE5E8A5CF372C386DB7F2840295B902B1E3B88751A9B6 |
SHA-512: | 6FB5658A18742FE5428A89E06E7EC0B3AE07658329CDA5FB8F0801356648D992A9C11F9E26D2468E7153665C8F3D626151256336617037B7B5F6BF3B0ED6777A |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 79872 |
Entropy (8bit): | 7.997843169471513 |
Encrypted: | true |
SSDEEP: | 1536:SohxbClN1Bzx9wpidSop7s9FJ8ejlM+wd/zJP7vxugTGMOZ1e:SoraBzPPdS/9XfwpzJP7Jugqj1e |
MD5: | CC9CC6F20A1EA21EA470B504FDE0F90C |
SHA1: | 1E7AFADF12F7A09A68C93BA813C64C2C9B225E71 |
SHA-256: | 2F9D2D953CCFEDDD5DEC2DF0BC5134F002F44F31715BD812F81875CDF6B550A6 |
SHA-512: | 64C4E6ED40C401BF82ADE85189E7E862F7817965F2739FB7C93B7C2A6FD4B4959585BAF05EEB1E4A21E5F665E64709C3FA670AAE5CA1EE2B7927E7FE1E4D3824 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 105472 |
Entropy (8bit): | 5.077087329848572 |
Encrypted: | false |
SSDEEP: | 768:xhSaAwuXc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUs6:eaAwusPdKaj6iTcPAsA+ |
MD5: | B99AD1F5C7742F52686D2508FD00982A |
SHA1: | 7B0449CADAF6A2A28DBF7E65FD45A1FD12EDDB48 |
SHA-256: | AC58BF2BC9334DD912148161F79DC611A7326465CF959F7374F387E8AFC61B42 |
SHA-512: | 78397576FA9CD90C7B8EA8ECE2F5B31887F5E5EB6D5A3C6FB69E4BA2554B14286142D68DB2F6DEEC4C21AD28B8148A89494154F65CE36F24EEA793EB3D96F472 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 895 |
Entropy (8bit): | 3.529004704992108 |
Encrypted: | false |
SSDEEP: | 12:oLOyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1:oiyGS9PvCA433C+sCNC1 |
MD5: | 9FA6250AC33B492A0812FC44C12A8A0C |
SHA1: | B4277E0D18E4FDB16B4437F0803BB6E04438A162 |
SHA-256: | 26A3D1D787256EDD456A7E86452AD615AD8AEA98C58F8ECEA9EE4978F62D02DE |
SHA-512: | FFE0CD06A9BD86E673A0D92E3C7FB87A2E50A80B40C4716EE224264F9BE8A4E32F78E86F38E38156AD40CA8D987537CB65B9B9DDA86BFEF2FDBB9AD0CB836E52 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 62464 |
Entropy (8bit): | 6.691860814252206 |
Encrypted: | false |
SSDEEP: | 1536:82U0pkzUWBh2zGc/xv5mjKu2IwNnPEBiqXv+G/UXT6TvYd:82UDQWf05mjccBiqXvpgb |
MD5: | 85667E167580AB6EE879A397EC8378D5 |
SHA1: | 3C22100369DD7E9FC15788182A7647CC18A12EC8 |
SHA-256: | FAB0E8057B43711FDCF24AB3BB355B5CBC3F3D37782E598BF4925AB58E602E74 |
SHA-512: | 398C52BEC5B244353715BC4A044415DB5A542BB9EF8C98D4C425BAEA55E2BDC0946753C5AE1775A950FB1FC2F2F3119243178D58F3230873A77086BB4FFF31D4 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 51200 |
Entropy (8bit): | 7.996655669830848 |
Encrypted: | true |
SSDEEP: | 1536:VklthqG33QEqywJCsrUvekJ9dVLw45uRY4hUfrR:V23AEVwEfJ9XLw45riUfrR |
MD5: | 76D9165FFF95E5302786C486398E284B |
SHA1: | ABE552EE6A06100D96AEFC6F2AF6E189AA766227 |
SHA-256: | 1B5A2E903DEC1BD0620E473D0DFF69761ACF5E375EAC1ED87ADF76F36F2386A3 |
SHA-512: | 6CC547E452FDA1A60FBFB016027791788B23C3591114D7800B244ABA620717DF5A72B5CA1C98AA1355CA2C8B0E7395C04EC072DB9606540051FD99B1846FB198 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 144384 |
Entropy (8bit): | 6.466063523256831 |
Encrypted: | false |
SSDEEP: | 3072:PDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbI:GO5bLezWWt/Dd314V14ZgP0JaAOz04pC |
MD5: | 57B6E79E7402D37A0B83CFF2DB1D0273 |
SHA1: | 8805DF3CABF590F92B2ECB7EFAE60D82F14F0B6F |
SHA-256: | 8DF20B2B819AA0C6E36877BA7063FED41274B988C46C28EC7E4B3C72584EC2E7 |
SHA-512: | 49EAFE0D09F850C52006C3DF4DD58E2D4CE1D6AA22AA7A378D6345AB6FE7C92987E134E4C486DEF75E6B0219D867AE1229AA828440C5624EF8C93C7CC1E79DAF |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 71680 |
Entropy (8bit): | 7.997185886941614 |
Encrypted: | true |
SSDEEP: | 1536:bvgT0gwThL3g9hMNG6HNnBAcmSJU3VXkxf3nZ9rY47K0qMLE9S7f:bvgABhL32wHNn6cBgX+brY47K0qqtf |
MD5: | 34BE2CF79F42494DB963EC85DA206D2E |
SHA1: | 2713983B0B393CFF8E07630B1ABC107FE90BDC5B |
SHA-256: | 7CFB013FACCD6086F660D5B46712EBACABF2A160A26E453A7B83D83412A16A11 |
SHA-512: | 47CD4E47A69059235607B95342E069CCD7C8E41F7D6D9E1DDC9BF5F93BC8C7A064A49EDC26ADC41CCD3F24B5515E965D3E9CAAC391D345D3D5209C6ADEDD61CB |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\!Set-up..exe |
File Type: | |
Category: | dropped |
Size (bytes): | 34424 |
Entropy (8bit): | 7.994339551631228 |
Encrypted: | true |
SSDEEP: | 768:VCFeeq+5DGzH8CfNr7GfSLnANmqrfy10Uy/hrMBohg9:VCFeeQBlr7GKzaXy0UyZrK |
MD5: | F0067E491667E285C6AA36CABB0934F0 |
SHA1: | 05F07BC57272ACEA6794F92726B6B05AC4BF41EA |
SHA-256: | 7C27FA3805B5877F74A80274B3ACCFF8041CFCB5C8FF930DE5B93F49569A9C8E |
SHA-512: | FFDAD8684222F1E957A8E64DF94EE6DEA74BE948E8ABA9C759B5995B8337A9C1F363C1B098D32C393DC69D7470C9BA2E748E4D057F3FE89E6F4C99B02DE2F9AF |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 7390 |
Entropy (8bit): | 7.597721493375944 |
Encrypted: | false |
SSDEEP: | 192:bH6N8VEVFJ84kcGNq4/C+Q3ISVSWMZMQ3rw:brVEVFJ8ZcGwGBk7/UMQ3rw |
MD5: | 117FE1670C955271C9D468192301A43F |
SHA1: | 46E5D4E2284C95B30D8D5C8C506A5376987B70A6 |
SHA-256: | 4C4FD142141A03A04B927A31F365DFB0ACD6F972340B109430AF367EAA2856ED |
SHA-512: | 1BECFB8DDE3672C2A6FBD33BE641CD0E15852365AD2DEED41700F3C441BE90F691B564AE947813A04D19665E9B39AC17F73B1A7EFB54CE8B4821B0A25D2DCEF9 |
Malicious: | false |
Preview: |
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
Download File
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 64 |
Entropy (8bit): | 0.6599547231656377 |
Encrypted: | false |
SSDEEP: | 3:NlllulRlltl:NllU |
MD5: | 2AAC5546A51052C82C51A111418615EB |
SHA1: | 14CFBEF3B3D238893C68F1BD6FE985DACF1953F1 |
SHA-256: | DBBA7151765EDB3661C0B1AD08037C0BDDC43227D2F2E8DDAC33C4A1E7C4151F |
SHA-512: | 1273F4B0365E213134E7FBC3BE45CAC33CB32AB6CED85479905C702F0429A0491A5E9C878E5FEFFA05BB0D1AA7F704949D13DD1DA9FCEB93665F1CC110FB24B8 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
File Type: | |
Category: | dropped |
Size (bytes): | 5659 |
Entropy (8bit): | 5.059430887107316 |
Encrypted: | false |
SSDEEP: | 96:5puA5jKEcXrj7uDQgzQs4x3pBxu0knx/ICu:5p9pcXr2DFzd4x3pBIXnx/ju |
MD5: | 697EB758D2A3D2C71F0857A9B7D0F526 |
SHA1: | 9BE1BE38EC1E38EF0D4F3C04A3BA3DC9A0958A41 |
SHA-256: | CEA13B090B80DE98292B698298F6AC8CCA8FEDC5F3648FD737F01D28E4EF87AC |
SHA-512: | 6BA18397D4107C46B4C096FFE2D487868E405619CE730E09C635F143C45CABC12A057A4F339986873C8ADF8D7854F3D830CE2FDA3FFD3354D273CD006AF6D7D3 |
Malicious: | true |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 60 |
Entropy (8bit): | 4.038920595031593 |
Encrypted: | false |
SSDEEP: | 3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX |
MD5: | D17FE0A3F47BE24A6453E9EF58C94641 |
SHA1: | 6AB83620379FC69F80C0242105DDFFD7D98D5D9D |
SHA-256: | 96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 |
SHA-512: | 5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 4.9564593876511305 |
TrID: |
|
File name: | !Set-up..exe |
File size: | 14'866'519 bytes |
MD5: | 27968eebcb115c6ecb62199a98ce9ee6 |
SHA1: | 7892f28bf31caf505e792268e138210588aa4d8d |
SHA256: | a124b81ef52d77f88c5b00f0a999482d429602f3cf5a413b3860c2b45909272d |
SHA512: | 60afd0ab796b4f96733b24fb83fe9a4a60833a10e8b2961a3e8fa4b9b29d6ea469fb92bb1161299cc094afcbfcd9db2249dee6ab97840171a41b8917ed648424 |
SSDEEP: | 24576:JfK4O0f5F4PCxULgB/88cv15mKLTanYE2caHvdzzfn2eK:3L5gcB/88cDPLT0i9f2eK |
TLSH: | 6BE6C47073FCD079D81608C1EA92B5D39627E6B2B0C3146CA2585EED31B310DBE9DB69 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...N...B...8..... |
Icon Hash: | 41c4d42c79596d41 |
Entrypoint: | 0x4038af |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | DBDA3B2A7B9BCBCB6848546630032BBC |
Thumbprint SHA-1: | D0E0723E97AFFB6654D2A219076FFAA775A3211B |
Thumbprint SHA-256: | BC94198163C2DA318A3571ACE8CB7CD8DFAD1C50FD09890C8A3A0FF0557393E1 |
Serial: | 3B5F7487FE8960073A53D8C4 |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 0040A268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00409030h] |
push 00008001h |
call dword ptr [004090B4h] |
push ebp |
call dword ptr [004092C0h] |
push 00000008h |
mov dword ptr [0047EB98h], eax |
call 00007FB82CF0434Bh |
push ebp |
push 000002B4h |
mov dword ptr [0047EAB0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 0040A264h |
call dword ptr [00409184h] |
push 0040A24Ch |
push 00476AA0h |
call 00007FB82CF0402Dh |
call dword ptr [004090B0h] |
push eax |
mov edi, 004CF0A0h |
push edi |
call 00007FB82CF0401Bh |
push ebp |
call dword ptr [00409134h] |
cmp word ptr [004CF0A0h], 0022h |
mov dword ptr [0047EAB8h], eax |
mov eax, edi |
jne 00007FB82CF0191Ah |
push 00000022h |
pop esi |
mov eax, 004CF0A2h |
push esi |
push eax |
call 00007FB82CF03CF1h |
push eax |
call dword ptr [00409260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007FB82CF019A3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007FB82CF0191Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xac40 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x100000 | 0x2e0de | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0xe2a95f | 0x2ef8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x86000 | 0x994 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x9000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x728c | 0x7400 | 419d4e1be1ac35a5db9c47f553b27cea | False | 0.6566540948275862 | data | 6.499708590628113 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x9000 | 0x2b6e | 0x2c00 | cca1ca3fbf99570f6de9b43ce767f368 | False | 0.3678977272727273 | data | 4.497932535153822 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xc000 | 0x72b9c | 0x200 | 77f0839f8ebea31040e462523e1c770e | False | 0.279296875 | data | 1.8049406284608531 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x7f000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x100000 | 0x2e0de | 0x2e200 | ce5bbc296f77bb94a8c8f9aca1e2922b | False | 0.2826632367886179 | data | 5.3217470933306865 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x12f000 | 0xfd6 | 0x1000 | 98b5852fe7cbf1ae227944ba00d536ab | False | 0.567626953125 | data | 5.312168663390484 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0x10042c | 0x1f50 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0013722554890219 |
RT_ICON | 0x10237c | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.4860659072416599 |
RT_ICON | 0x1049e4 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.5398451730418944 |
RT_ICON | 0x105b0c | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.650709219858156 |
RT_ICON | 0x105f74 | 0x10828 | Device independent bitmap graphic, 128 x 256 x 32, image size 67584 | 0.15040518159233407 | ||
RT_ICON | 0x11679c | 0x94a8 | Device independent bitmap graphic, 96 x 192 x 32, image size 38016 | 0.24603216312802187 | ||
RT_ICON | 0x11fc44 | 0x5488 | Device independent bitmap graphic, 72 x 144 x 32, image size 21600 | 0.2909426987060998 | ||
RT_ICON | 0x1250cc | 0x4228 | Device independent bitmap graphic, 64 x 128 x 32, image size 16896 | 0.25301133679735477 | ||
RT_ICON | 0x1292f4 | 0x25a8 | Device independent bitmap graphic, 48 x 96 x 32, image size 9600 | 0.3447095435684647 | ||
RT_ICON | 0x12b89c | 0x10a8 | Device independent bitmap graphic, 32 x 64 x 32, image size 4224 | 0.38907129455909945 | ||
RT_ICON | 0x12c944 | 0x988 | Device independent bitmap graphic, 24 x 48 x 32, image size 2400 | 0.4959016393442623 | ||
RT_ICON | 0x12d2cc | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | 0.5558510638297872 | ||
RT_DIALOG | 0x12d734 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x12d834 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x12d950 | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x12d9b0 | 0x76 | data | 0.7627118644067796 | ||
RT_GROUP_ICON | 0x12da28 | 0x3e | data | English | United States | 0.8225806451612904 |
RT_VERSION | 0x12da68 | 0x3a0 | data | English | United States | 0.4105603448275862 |
RT_MANIFEST | 0x12de08 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-28T21:35:56.856378+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:57.889164+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:57.889164+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:59.109107+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:59.860017+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:35:59.860017+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:01.379888+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49797 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:03.672548+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49803 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:04.494462+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.5 | 49803 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:05.830553+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49809 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:08.201372+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49815 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:10.507535+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49821 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:13.624453+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49831 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:14.406950+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.5 | 49831 | 172.67.213.115 | 443 | TCP |
2024-12-28T21:36:15.857196+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.5 | 49836 | 172.67.75.40 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 21:35:55.505404949 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:55.505428076 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:55.505565882 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:55.506822109 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:55.506836891 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:56.856273890 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:56.856378078 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:56.910312891 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:56.910322905 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:56.910563946 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:56.957211971 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.125634909 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.125654936 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.125730991 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.888971090 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.889053106 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.889132023 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.890855074 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.890865088 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.890894890 CET | 49784 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.890901089 CET | 443 | 49784 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.897488117 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.897524118 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:57.897588015 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.897891998 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:57.897906065 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.108987093 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.109107018 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.110348940 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.110363007 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.110579967 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.113692999 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.113718987 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.113751888 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.859869003 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.859911919 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.859935045 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.859967947 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.859982014 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.859988928 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.860016108 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.860028982 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.860063076 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.868216991 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.876693964 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.880799055 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.880806923 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.885030985 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.888876915 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.888884068 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:35:59.940063000 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:35:59.979295969 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.035368919 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.051628113 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055612087 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055632114 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055680037 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.055690050 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055701971 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055759907 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.055896044 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.055910110 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.055943012 CET | 49790 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.055949926 CET | 443 | 49790 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.120758057 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.120785952 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:00.120872974 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.121197939 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:00.121211052 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:01.379781008 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:01.379888058 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:01.381772041 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:01.381783009 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:01.382028103 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:01.385680914 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:01.385802984 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:01.385832071 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:02.323647022 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:02.323729038 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:02.323888063 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:02.361145020 CET | 49797 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:02.361156940 CET | 443 | 49797 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:02.459619045 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:02.459654093 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:02.459728003 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:02.460748911 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:02.460764885 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:03.672410011 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:03.672548056 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:03.673944950 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:03.673958063 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:03.674186945 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:03.677562952 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:03.677763939 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:03.677798986 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:03.677853107 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:03.723345995 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:04.494476080 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:04.494545937 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:04.494621038 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:04.494842052 CET | 49803 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:04.494863987 CET | 443 | 49803 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:04.572468996 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:04.572494984 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:04.572578907 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:04.572877884 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:04.572891951 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:05.830362082 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:05.830553055 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:05.831829071 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:05.831835032 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:05.832026005 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:05.833442926 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:05.833570957 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:05.833595991 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:05.833678007 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:05.833684921 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:06.812208891 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:06.812299013 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:06.812366009 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:06.812540054 CET | 49809 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:06.812552929 CET | 443 | 49809 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:06.894860983 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:06.894931078 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:06.895097971 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:06.895368099 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:06.895385981 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.201273918 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.201371908 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.204981089 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.205002069 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.205421925 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.206691027 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.206790924 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.206799030 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.966052055 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.966140032 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:08.966192007 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.966329098 CET | 49815 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:08.966346979 CET | 443 | 49815 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:09.243052959 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:09.243088007 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:09.243159056 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:09.243419886 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:09.243432999 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.507436991 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.507534981 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.531601906 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.531619072 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.531810045 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.533833981 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.534444094 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.534478903 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.534568071 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.534609079 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.534707069 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.534734011 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.534832001 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.534858942 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.534974098 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.535002947 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.535134077 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.535166025 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.575345993 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.575539112 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.575571060 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.623343945 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.623528004 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.623573065 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.623589993 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.667383909 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.667551041 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.667593002 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.715368032 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.715509892 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.763336897 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.774358034 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.774492979 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:10.774561882 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:10.987425089 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:12.409279108 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:12.409362078 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:12.409452915 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:12.409672976 CET | 49821 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:12.409689903 CET | 443 | 49821 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:12.412817001 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:12.412862062 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:12.412936926 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:12.413228035 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:12.413238049 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:13.624362946 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:13.624453068 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:13.625614882 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:13.625619888 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:13.625822067 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:13.626933098 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:13.626967907 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:13.626992941 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:14.406955957 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:14.407023907 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:14.407254934 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:14.407329082 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:14.407345057 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:14.407356024 CET | 49831 | 443 | 192.168.2.5 | 172.67.213.115 |
Dec 28, 2024 21:36:14.407360077 CET | 443 | 49831 | 172.67.213.115 | 192.168.2.5 |
Dec 28, 2024 21:36:14.549663067 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:14.549700975 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:14.549801111 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:14.550246954 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:14.550261021 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:15.857098103 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:15.857196093 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:15.858777046 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:15.858784914 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:15.858984947 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:15.860179901 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:15.903327942 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662843943 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662880898 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662905931 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662929058 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662944078 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:16.662964106 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.662975073 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:16.663021088 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.663067102 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:16.663377047 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:16.663387060 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Dec 28, 2024 21:36:16.663394928 CET | 49836 | 443 | 192.168.2.5 | 172.67.75.40 |
Dec 28, 2024 21:36:16.663398981 CET | 443 | 49836 | 172.67.75.40 | 192.168.2.5 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 28, 2024 21:35:06.913566113 CET | 62475 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 28, 2024 21:35:07.052226067 CET | 53 | 62475 | 1.1.1.1 | 192.168.2.5 |
Dec 28, 2024 21:35:55.362039089 CET | 55895 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 28, 2024 21:35:55.499284029 CET | 53 | 55895 | 1.1.1.1 | 192.168.2.5 |
Dec 28, 2024 21:36:14.410732031 CET | 65332 | 53 | 192.168.2.5 | 1.1.1.1 |
Dec 28, 2024 21:36:14.548464060 CET | 53 | 65332 | 1.1.1.1 | 192.168.2.5 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 28, 2024 21:35:06.913566113 CET | 192.168.2.5 | 1.1.1.1 | 0x442f | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:35:55.362039089 CET | 192.168.2.5 | 1.1.1.1 | 0x6a2d | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:36:14.410732031 CET | 192.168.2.5 | 1.1.1.1 | 0x9ebc | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 28, 2024 21:35:07.052226067 CET | 1.1.1.1 | 192.168.2.5 | 0x442f | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 28, 2024 21:35:55.499284029 CET | 1.1.1.1 | 192.168.2.5 | 0x6a2d | No error (0) | 172.67.213.115 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:35:55.499284029 CET | 1.1.1.1 | 192.168.2.5 | 0x6a2d | No error (0) | 104.21.37.209 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:14.548464060 CET | 1.1.1.1 | 192.168.2.5 | 0x9ebc | No error (0) | 172.67.75.40 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:14.548464060 CET | 1.1.1.1 | 192.168.2.5 | 0x9ebc | No error (0) | 104.26.2.16 | A (IP address) | IN (0x0001) | false | ||
Dec 28, 2024 21:36:14.548464060 CET | 1.1.1.1 | 192.168.2.5 | 0x9ebc | No error (0) | 104.26.3.16 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.5 | 49784 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:35:57 UTC | 264 | OUT | |
2024-12-28 20:35:57 UTC | 8 | OUT | |
2024-12-28 20:35:57 UTC | 1136 | IN | |
2024-12-28 20:35:57 UTC | 7 | IN | |
2024-12-28 20:35:57 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.5 | 49790 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:35:59 UTC | 265 | OUT | |
2024-12-28 20:35:59 UTC | 49 | OUT | |
2024-12-28 20:35:59 UTC | 1129 | IN | |
2024-12-28 20:35:59 UTC | 240 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 183 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN | |
2024-12-28 20:35:59 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.5 | 49797 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:01 UTC | 282 | OUT | |
2024-12-28 20:36:01 UTC | 12831 | OUT | |
2024-12-28 20:36:02 UTC | 1138 | IN | |
2024-12-28 20:36:02 UTC | 20 | IN | |
2024-12-28 20:36:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.5 | 49803 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:03 UTC | 276 | OUT | |
2024-12-28 20:36:03 UTC | 15037 | OUT | |
2024-12-28 20:36:04 UTC | 1143 | IN | |
2024-12-28 20:36:04 UTC | 20 | IN | |
2024-12-28 20:36:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.5 | 49809 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:05 UTC | 281 | OUT | |
2024-12-28 20:36:05 UTC | 15331 | OUT | |
2024-12-28 20:36:05 UTC | 5226 | OUT | |
2024-12-28 20:36:06 UTC | 1137 | IN | |
2024-12-28 20:36:06 UTC | 20 | IN | |
2024-12-28 20:36:06 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.5 | 49815 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:08 UTC | 277 | OUT | |
2024-12-28 20:36:08 UTC | 1207 | OUT | |
2024-12-28 20:36:08 UTC | 1140 | IN | |
2024-12-28 20:36:08 UTC | 20 | IN | |
2024-12-28 20:36:08 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.5 | 49821 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:10 UTC | 277 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:10 UTC | 15331 | OUT | |
2024-12-28 20:36:12 UTC | 1131 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.5 | 49831 | 172.67.213.115 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:13 UTC | 265 | OUT | |
2024-12-28 20:36:13 UTC | 84 | OUT | |
2024-12-28 20:36:14 UTC | 1129 | IN | |
2024-12-28 20:36:14 UTC | 126 | IN | |
2024-12-28 20:36:14 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.5 | 49836 | 172.67.75.40 | 443 | 6460 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-28 20:36:15 UTC | 196 | OUT | |
2024-12-28 20:36:16 UTC | 918 | IN | |
2024-12-28 20:36:16 UTC | 451 | IN | |
2024-12-28 20:36:16 UTC | 1369 | IN | |
2024-12-28 20:36:16 UTC | 1369 | IN | |
2024-12-28 20:36:16 UTC | 1369 | IN | |
2024-12-28 20:36:16 UTC | 1109 | IN | |
2024-12-28 20:36:16 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 15:35:00 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\Desktop\!Set-up..exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 14'866'519 bytes |
MD5 hash: | 27968EEBCB115C6ECB62199A98CE9EE6 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 2 |
Start time: | 15:35:01 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 15:35:01 |
Start date: | 28/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe80000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 15:35:03 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 15:35:04 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 9 |
Start time: | 15:35:04 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x8d0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 10 |
Start time: | 15:35:05 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xeb0000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 15:35:05 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 15:35:05 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x790000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 13 |
Start time: | 15:35:05 |
Start date: | 28/12/2024 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\71992\Banned.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x6b0000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 14 |
Start time: | 15:35:05 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xa10000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 17 |
Start time: | 15:36:15 |
Start date: | 28/12/2024 |
Path: | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x700000 |
File size: | 433'152 bytes |
MD5 hash: | C32CA4ACFCC635EC1EA6ED8A34DF5FAC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 18 |
Start time: | 15:36:16 |
Start date: | 28/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff6d64d0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.9% |
Total number of Nodes: | 1481 |
Total number of Limit Nodes: | 26 |
Graph
Function 004050F9 Relevance: 66.8, APIs: 36, Strings: 2, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004038AF Relevance: 52.8, APIs: 22, Strings: 8, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406831 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405958 Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 19.4, APIs: 6, Strings: 5, Instructions: 175fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E7C Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E5C Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037F8 Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DDB Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DC4 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DB1 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004049A8 Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406CC7 Relevance: 31.7, APIs: 9, Strings: 9, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044D1 Relevance: 30.0, APIs: 15, Strings: 2, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406EFE Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004079A2 Relevance: .3, Instructions: 347COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040737E Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063D8 Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040E4 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406AC5 Relevance: 35.2, APIs: 15, Strings: 5, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406113 Relevance: 15.8, APIs: 7, Strings: 2, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 12.3, APIs: 3, Strings: 4, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DF6 Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040487A Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043D9 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 73stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406250 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407224 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406391 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048F8 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 58windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C6B Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062CF Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DE2 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07631518 Relevance: 5.6, Strings: 4, Instructions: 591COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04A53FA0 Relevance: .5, Instructions: 506COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 076314FC Relevance: .1, Instructions: 125COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04A53010 Relevance: .1, Instructions: 65COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 04A53000 Relevance: .1, Instructions: 58COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0300D01D Relevance: .0, Instructions: 45COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0300D007 Relevance: .0, Instructions: 44COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07630DF8 Relevance: 9.2, Strings: 7, Instructions: 496COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07630148 Relevance: 9.1, Strings: 7, Instructions: 328COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 07632C10 Relevance: 5.1, Strings: 4, Instructions: 94COMMON
Strings |
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Similarity |
|