Windows
Analysis Report
vlid_acid.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- vlid_acid.exe (PID: 6888 cmdline:
"C:\Users\ user\Deskt op\vlid_ac id.exe" MD5: 4FD542A5D9D9FB3BF5C712D9C8798977) - cmd.exe (PID: 7000 cmdline:
"C:\Window s\System32 \cmd.exe" /c move Ci tation Cit ation.cmd & Citation .cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7008 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 6188 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - conhost.exe (PID: 5924 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - findstr.exe (PID: 6232 cmdline:
findstr /I "opssvc w rsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 3452 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 3844 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 4208 cmdline:
cmd /c md 170898 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - extrac32.exe (PID: 4460 cmdline:
extrac32 / Y /E Repos itory MD5: 9472AAB6390E4F1431BAA912FCFF9707) - findstr.exe (PID: 6020 cmdline:
findstr /V "zen" Con sist MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 792 cmdline:
cmd /c cop y /b 17089 8\Heard.co m + Propos als + Orga nizational + Extensi on + Mb + Elite + Pa rents + Sa n + Wordpr ess + Cita tions + Is o + Aborig inal 17089 8\Heard.co m MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - cmd.exe (PID: 1216 cmdline:
cmd /c cop y /b ..\Wi lling + .. \But + ..\ Situated + ..\Therma l + ..\Shu ttle + ..\ Conflicts S MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Heard.com (PID: 5776 cmdline:
Heard.com S MD5: 62D09F076E6E0240548C2F837536A46A) - choice.exe (PID: 6120 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Author: Joe Security: |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:18.061931+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:18.993785+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:20.266830+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:21.342880+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:22.364636+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:23.533004+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:24.485510+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:26.436081+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 172.67.190.223 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:18.546834+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:19.538336+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:26.910270+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49745 | 172.67.190.223 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:18.546834+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:19.538336+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:23.997896+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49743 | 172.67.190.223 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_004050CD |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_00403883 |
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior | ||
Source: | File created: | Jump to behavior |
Source: | Code function: | 0_2_0040497C | |
Source: | Code function: | 0_2_00406ED2 | |
Source: | Code function: | 0_2_004074BB |
Source: | Dropped File: |
Source: | Code function: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 0_2_004044A5 |
Source: | Code function: | 0_2_004024FB |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Source: | File read: | Jump to behavior |
Source: | Key opened: | Jump to behavior |
Source: | ReversingLabs: | ||
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Process created: |
Source: | Window detected: |
Source: | Static file information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_004062FC |
Source: | Static PE information: |
Persistence and Installation Behavior |
---|
Source: | File created: | Jump to dropped file |
Source: | File created: | Jump to dropped file |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_004062D5 | |
Source: | Code function: | 0_2_00402E18 | |
Source: | Code function: | 0_2_00406C9B |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_004062FC |
Source: | Process token adjusted: | Jump to behavior | ||
Source: | Process token adjusted: | Jump to behavior |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00406805 |
Source: | Key value queried: | Jump to behavior |
Source: | WMI Queries: | ||
Source: | WMI Queries: | ||
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Remote Access Functionality |
---|
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 121 Windows Management Instrumentation | 1 DLL Side-Loading | 12 Process Injection | 111 Masquerading | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 11 Input Capture | 11 Encrypted Channel | Exfiltration Over Other Network Medium | 1 System Shutdown/Reboot |
Credentials | Domains | Default Accounts | 1 Native API | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 11 Input Capture | 21 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 12 Process Injection | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 13 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 Deobfuscate/Decode Files or Information | NTDS | 3 Process Discovery | Distributed Component Object Model | 1 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Obfuscated Files or Information | LSA Secrets | 13 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 25 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
13% | ReversingLabs | |||
28% | Virustotal | Browse |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
begguinnerz.biz | 172.67.190.223 | true | true | unknown | |
yHBVGpmMtnvYS.yHBVGpmMtnvYS | unknown | unknown | false | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
172.67.190.223 | begguinnerz.biz | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582289 |
Start date and time: | 2024-12-30 09:13:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 14s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 17 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | vlid_acid.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@27/23@2/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 20.12.23.50, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtAllocateVirtualMemory calls found.
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Report size getting too big, too many NtSetInformationFile calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
03:13:58 | API Interceptor | |
03:14:03 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
172.67.190.223 | Get hash | malicious | LummaC | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
begguinnerz.biz | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | KnowBe4, PDFPhish | Browse |
| ||
Get hash | malicious | Mirai | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | Remcos | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC Stealer | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | modified |
Size (bytes): | 947288 |
Entropy (8bit): | 6.630612696399572 |
Encrypted: | false |
SSDEEP: | 24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK |
MD5: | 62D09F076E6E0240548C2F837536A46A |
SHA1: | 26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2 |
SHA-256: | 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49 |
SHA-512: | 32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F |
Malicious: | true |
Antivirus: |
|
Joe Sandbox View: |
|
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 479347 |
Entropy (8bit): | 7.999630061754001 |
Encrypted: | true |
SSDEEP: | 12288:T3z3Dw1wBV+XCF3Jp83KXfE3lVHKhquYgTS:T3zzCwH+SpJp83KEVHqq6TS |
MD5: | E29526011A875B5DF841536C5753C6F7 |
SHA1: | CD0A163314691BAD0879C5C4089F80753E152A9B |
SHA-256: | 98DA08475B74376406EF3EF14F37679FE7A570EC352E5452DD92A334C951EFD1 |
SHA-512: | E0F21E5118BF8A5350C08897BA7D3592685C59AF6708A38DAC900DE9D368EFE05B70C071F2F95FB6B66F25F0128B79201F70D09F48674B1A1A950CE8598E3F98 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 75773 |
Entropy (8bit): | 7.100260479886893 |
Encrypted: | false |
SSDEEP: | 1536:NWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:NWy4ZNoGmROL7F1G7ho2kOb |
MD5: | 07314039B19DC13C7A6C82F2A9274051 |
SHA1: | D11EA8B8D1B309B6C37F2F82B21D7DD81212084F |
SHA-256: | C720CCC9B2B3178BF072ABB0C1057ACC6726DA0FA6A2E50A87AF879C40E2ED7E |
SHA-512: | 617831791D8E83F889F1A7864FC7DFD5D4E28E10B58996297619316CFCB057A06A160C293006839A4A62A52ED6864B47839F8A335175317095992A31FB7E2166 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 98304 |
Entropy (8bit): | 7.998217025515665 |
Encrypted: | true |
SSDEEP: | 1536:MFD3mkhv0H36j+6Eb35G5xB+ZaIdhiBL6fruLNlpEe3/I5mMSPQhw+JA2rIiBeJU:MFD3w+fEb4B+o2wBLNlpEe3q6PQhw+rT |
MD5: | 353CBCC4DB2A06CA96989D8DB45F5845 |
SHA1: | 8FEDD5BB69D3B32031E05290DE53EFE342383491 |
SHA-256: | 7CEE924F41C91B416E718494229926A01FE493D882D0D9994DAE053E1A12EAFB |
SHA-512: | A3A8E0A6BC2407FD5AD8189A1CFF148671E4AFFA2157D7238DF71164E671491B0FC62E3F218A0C1EC0ED10DAF2B927E2B7EF6D7826199DA08C8484596E002DD3 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17762 |
Entropy (8bit): | 5.143801636465944 |
Encrypted: | false |
SSDEEP: | 384:fwRbDETAUOyKbv7Xj1zVjRBG0B4Tja59ZgtQsZkX9L89U1oS47cvMHes23ts:fqgMoKnj1zVjRwMZrZges6XpyUoSIJe6 |
MD5: | 6627BB2C9F64F623B082646BDAA3771F |
SHA1: | 02D4E9EEE858C99C7BC869166DB9B70CAEC40186 |
SHA-256: | 4AD227FEB69B27715EDA0555B3963F8D6FAECB971F3E4627B55EF9E766710B0D |
SHA-512: | 7ACEBFA6D8B03C2718E3652E2060CB64322F4440701CA88E6284BEBF6848C90925D1B0B9D4BE6F55B8023C7378166E1DE4EFC3F4970C3A54E8C1AA508E5F8110 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\cmd.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 17762 |
Entropy (8bit): | 5.143801636465944 |
Encrypted: | false |
SSDEEP: | 384:fwRbDETAUOyKbv7Xj1zVjRBG0B4Tja59ZgtQsZkX9L89U1oS47cvMHes23ts:fqgMoKnj1zVjRwMZrZges6XpyUoSIJe6 |
MD5: | 6627BB2C9F64F623B082646BDAA3771F |
SHA1: | 02D4E9EEE858C99C7BC869166DB9B70CAEC40186 |
SHA-256: | 4AD227FEB69B27715EDA0555B3963F8D6FAECB971F3E4627B55EF9E766710B0D |
SHA-512: | 7ACEBFA6D8B03C2718E3652E2060CB64322F4440701CA88E6284BEBF6848C90925D1B0B9D4BE6F55B8023C7378166E1DE4EFC3F4970C3A54E8C1AA508E5F8110 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 66560 |
Entropy (8bit): | 5.024262418642423 |
Encrypted: | false |
SSDEEP: | 384:Nu88888888888888888888888888888zv888888NfU84444Qnoooooooooooooot:N/SGKAGWRqA60dTcR4qYG |
MD5: | BD0C8169FEA6A0F0AD4863961CB3E828 |
SHA1: | A283793374A89319F3161F258C590832DDF18770 |
SHA-256: | 3AEBD16034DAFB00367C74809DE05380FBF0DE25C5CBBEE7485B69EEE55D3E06 |
SHA-512: | FA170A2520E91454A777F559086862D24C113BFA529715C35CCC42220BE191628D2AA0E1BD255104463698E8EE957C84C2AF0A2CAEC06934B482A1CBF0BC66B0 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 23667 |
Entropy (8bit): | 7.991643923097645 |
Encrypted: | true |
SSDEEP: | 384:QYHOlFi9wARt0OszycBUb+ZF1K4n8gq+1KQM5fzvig4C5TApCfA6D5nS:Qm8i9dAOsWciCv1ZnY+1KPvig4C95nS |
MD5: | 6F0C63FB9A8005E1B9893326E4C5D644 |
SHA1: | 37C8D16B7335F238F2DD0F4D080071B17B7CAFAD |
SHA-256: | CC27A286BFF343903AD429D8443957AC09064D6EC7B27DB26827B1A835C7D748 |
SHA-512: | 738ACAAF1947758670DFD0228A544E74CF97DC4AAF7D35FC7829452975BFC37AD12A1ED9A0CD9D44A318E7FFC63935925BE4995980B3A00D29184372C3CC7693 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 2142 |
Entropy (8bit): | 5.125972126365666 |
Encrypted: | false |
SSDEEP: | 48:G9n9mTsCNvEQH5O5U1nPKrhBzM1FoMPhfq1koCqxy:OSEA5O5W+MfH5S1CqQ |
MD5: | 83312CAFD3A0F5112950C5E033D1F877 |
SHA1: | 1EAD3F8680199AD967A050123D1C848A4C37E3EE |
SHA-256: | 74BBB520A6F27437431AFBCE50D7F3C52711B8860D910588E2BEA2C3CB24FBF7 |
SHA-512: | 009A57214977C088BD1B2E4F24DC2EE2C563376716D134FD7850DC0424EBFF9F96DB0C032CCA3307C50150D0F8492FB055CF0AAA24012C49714D50EB3B90B738 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 129024 |
Entropy (8bit): | 6.689929071613126 |
Encrypted: | false |
SSDEEP: | 3072:DHSBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThF:UNPj0nEo3tb2j6AUkB0CThF |
MD5: | 53E2756E1204E5C25C38307DAA54185D |
SHA1: | 5B99A9C06CE605D93CC5B43B2EFD766C4EDC89E9 |
SHA-256: | 7C5D27DDDC9407FE64CA0FD3BA884AA9D593FC91BF7B4EC5127ACBAA4E1E2FF9 |
SHA-512: | 65CF4A3695E54CDD621D599F027DBF8B6DE1331CC77765EE0FE3FE40DE795398049A3E5DB10CF79C710272CD1BA8640C87C7750B76F64CE9848ADB5B43797D02 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 67584 |
Entropy (8bit): | 6.629775329931574 |
Encrypted: | false |
SSDEEP: | 1536:K2IwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+4:3cBiqXvpgF4qv+32eOyKODOSpQ4 |
MD5: | CA328A92D384E1172B0F657E588197CD |
SHA1: | E0EA7102302F25B4218159BF32EF79E1BB56345F |
SHA-256: | BFD10879455F94674DE0D891B993E28C84F547A45200E23DED744B76A7BF1ABE |
SHA-512: | B25C494E79D057D32498D25F85B8F85018B9495AF7EC2D254D23DBEF9D1D1011332455574E24F9D4D4EF2523B8AE660E0C41075A6E794F9632AF758C3C959D49 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 59392 |
Entropy (8bit): | 3.709686672759628 |
Encrypted: | false |
SSDEEP: | 768:WGfAHE9AUsFxyLtVSQsbZgar3R/OWel3EYr8q:/AsAhxjgarB/5el3EYr |
MD5: | 8F7A27CA8809B10DC04C9A81B4C82B03 |
SHA1: | 5BC8D6A5DB258139BE81B4CF8A46B542CC9F93B5 |
SHA-256: | 7A1C064F518ED6D7596ED47FAF2B8AA782E763948AEC3D84D6006FF97D5703FD |
SHA-512: | 9E688577A417E5A4940C09477B6E0695EA13FE032BC23B484ADE6050FAD8DB51EE071AB3AB9C2C63F060855DD91960B2123520067A79AB642A41FED4D22FADD7 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 147456 |
Entropy (8bit): | 6.6976644975283515 |
Encrypted: | false |
SSDEEP: | 3072:hAU4CE0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3Nxf:hAhClbfSCOMVIPPL/sZ7HS3zf |
MD5: | C62CF4EA70D4C9D82852E1FFC94E0437 |
SHA1: | 793BC14E085FBA0DBC1FCE0D8407AC1483F3926E |
SHA-256: | 7E5EA196F771120E2DF45468AC39DF309031B01926730A2B1DC4ACBB9F137C8A |
SHA-512: | 1FC7BD0AF67EF6CC51400A7BFF017F74BF5368818F57D51C107A69F833DD6B267919A4E5E4AE5AE849E0437EAB80A26C3A629BF0DDBBCEE4A7DF0D6487ED9E12 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 6.225444790851446 |
Encrypted: | false |
SSDEEP: | 1536:dlDfFgQa8BpDzdZPp7HE+tKA3QkvyNf7Xw2U0pkzUWBh2zGc/xv5mjKj:7dgQa8Bp/LxyA3laW2UDQWf05mjI |
MD5: | 86DFE448D6F558DC4AC44DBBEBEFB0CE |
SHA1: | AACA62907C75DAA348AD0CEA162B0C4197A1B781 |
SHA-256: | EEDA28037EDE8298DAB5EB33FA2A6615439CFDBEF809E6A765F3AD322EF7016D |
SHA-512: | 0A3D8E00DD5A5CE937E22A77F270CA3E42A870F65204C1A36CF49D3B411247AB0A1B58D2EF7A913987AFCE0B6E7FCD5BE8C463E632806D41AACA1617231F4187 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 78848 |
Entropy (8bit): | 6.556662304505025 |
Encrypted: | false |
SSDEEP: | 1536:LmESvn+pqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrV:LmESv+AqVnBypIbv18mLthfhnueoMmO1 |
MD5: | ED7BBB47A06DFB797C1C29023C951964 |
SHA1: | F670B7B70FF683D513A0E278BDCB7C3AD4FA70EF |
SHA-256: | 31984E14C8A40BBDA23C1BB7833F218BACC04EEE6FCA486CE3C4998E5009576C |
SHA-512: | C020B04283888DC850A98B14B160C4AD454C9E9060689AD59945DA5615B04972F8B5E08C921CAC9EDC8E77E697D0B9F5197B7FF816170B84701C320D441F8CE5 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 68608 |
Entropy (8bit): | 6.5499133237498395 |
Encrypted: | false |
SSDEEP: | 1536:sAD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzn:sg5PXPeiR6MKkjGWoUlJU7 |
MD5: | 96A4F605ABD67C69596D0F30891BCDA2 |
SHA1: | 8C3E19DD616CE28FEEDD05E6D5DF2A77B959D1EE |
SHA-256: | C17BAC465A6F151832B1DF82DD19D944F7612D7718162C78766CD19C3F3DA1B1 |
SHA-512: | A81ECD134E41B1BC0C7B11F6C8BBDBDEF71A286ECA4B995CD21C167EFBE04ED9050CF2D7E8279609CBB1CB338CD66DB879E1CC1D26FEF154AC7BB735BD77D1CA |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 490125 |
Entropy (8bit): | 7.9985939233577055 |
Encrypted: | true |
SSDEEP: | 12288:bsYPa6qM/MrFORTHll3LeIHBzzkHbUEaKfMgQ:bjPaPM/8C5VLeIHBzzEIExfdQ |
MD5: | 3FC44943E0E388647474298F5FC4F98C |
SHA1: | 66AA8E5313B1715FCE540F1CF985337115D3A60A |
SHA-256: | D6128EC0E64B67BE5CB7787E91F2D84330D7C8FFF4ECC5BF78C2F2D8F55E094E |
SHA-512: | 4CC34DC74A34F2FA8E2EAD392A3F7ED5E38FC1F50E37B425E416ABAC0D945056FED50EF549568AFC59104DD1E1133ABFD545B3F1A1BE8D4B1FE9CEEBA714340D |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 111616 |
Entropy (8bit): | 6.267354004779417 |
Encrypted: | false |
SSDEEP: | 3072:QDoioO5bLezW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeA0:9O5bLezWWt/Dd314V14ZgP0JaA0 |
MD5: | 68B81CA65154F033364440D912D50556 |
SHA1: | 0BE175FA5E63ECE9188B733E9B56D424A87DDD64 |
SHA-256: | 48771A7FAAF737D13E454593703A8BC1304352A49710913B3DD21A70AFD18F9D |
SHA-512: | FFF833A5D0C7E95B74D0FE1C492A71B5549B0BC8751CBFFAA6C855E220EDC222D8C1AC6C05F2F5A3696F3F8C5D029394B974A2831B34CCF053140DE59BFDCD21 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 70656 |
Entropy (8bit): | 7.99743404390903 |
Encrypted: | true |
SSDEEP: | 1536:RZQPp1VqDceQ4gXHBfE6Es6BcFg1SDUFZRCicYBJx3dg1271YtNSQqywXKW:MpzqDJ2XhfIs+cuSDuA+3xNG271YTlqv |
MD5: | 5B24FA429FB2C46E9B30609FF0CE2A48 |
SHA1: | 5728528CF2245E0F189AF5A510FAEAE8B4D41ABD |
SHA-256: | B4CE707BAB0CAC4F91125D6F88052FF734405C58EAA1744E81E088438B8DE8E6 |
SHA-512: | CCBF1849D8B92E0BF7E2EBE379F5BEA765A0A5063C69BD32EBE4DFF23E5E0B1A8BF991856417A44C49503B5D9B3D154549334DE199404517880E507FAC25DD6F |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 101376 |
Entropy (8bit): | 7.998103530402121 |
Encrypted: | true |
SSDEEP: | 3072:oeAJRQe9vySZT+u4yZh+sE0DZsnBQWkJZNq2Dk:o339vVP4yZnJ6B5kK2k |
MD5: | EBD570F07376BF2F88E64312737B8E1C |
SHA1: | D8DAAF771DA1DB6A27E1566C49479F52D1AA0257 |
SHA-256: | 710EE0073474296F0C83C5951C60998E5694BEAF438C1055F2961A0D4228435A |
SHA-512: | F7E0974E7E90A2F740856715E077B4B49BB827D407CE8C330DCEFA9E752A29A523EA2D843D38FE17A574E33DC6BE0ED46F666FA681B6BC52DD608B0960347E90 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 84992 |
Entropy (8bit): | 7.997978156044282 |
Encrypted: | true |
SSDEEP: | 1536:SBIYHMCZgikqCKXq9Q6IGw+VTq/gjlgcHam4m4Uk9Mxbq80tkLCc6ELs9uSqaN8U:0IY7ZzkqCKXq+Bgqo613Uk+A8rbrL2uK |
MD5: | 38FFA94E0E6C78BAF39AF60E3C708117 |
SHA1: | AE52D958BD438DC0E7D2AA4F83D062EACF6E211B |
SHA-256: | C85681F23AE88C9B5F480046920672B4E1CC510F2AF1622910B8247FFB2FC462 |
SHA-512: | 011355E40FFDDBCAC081BAE30916982C405D604241A42E9668FC96AD1B9D7083240F9C7D14E9FADE35EA41194A8AEF836D8BEBFC24682BCE77E49BB2ED981605 |
Malicious: | false |
Preview: |
Process: | C:\Users\user\Desktop\vlid_acid.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 100352 |
Entropy (8bit): | 7.998011545943105 |
Encrypted: | true |
SSDEEP: | 1536:DcSj21kcByaUAtVQMuxqiE4sO2IuNYMrOX31wcw0Z+3/WaLqzPD3eggKMVjRj97P:Ta4aKaNulwF0Z+3/oTD3kKk1Nj |
MD5: | AB8332216C0359A94D5907D2499796DC |
SHA1: | 522C62354690742AA60E1FBD7B110FD6A3EEFB92 |
SHA-256: | BA8C84E37D3A7B1237F014098393E68AECA58DC527ECAAF994F5A2BB078CC90C |
SHA-512: | 0E4EB5ABF3A460FA47397592AFFD5280A5A2173D88A7A703FFE622EB4C60BD9B12615674A39B564CF5ABDBD9CDA2339183ABCB38D4893B5BA06FE7AAC7A74CD4 |
Malicious: | false |
Preview: |
Process: | C:\Windows\SysWOW64\extrac32.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 61440 |
Entropy (8bit): | 5.959983628314459 |
Encrypted: | false |
SSDEEP: | 768:ZaHbdMNkNDUzSLKPDvFQC7Vkr5M4INduPbOU7aI4kCD9vmPukxhSaAwuXc/meD:ZMbFuz08QuklMBNIimuzaAwusPD |
MD5: | 3F0A63AF42CA7CD1017DD29FB2145A9E |
SHA1: | C9067449A9EE03F063F14419B4E04F3F3FF50AF8 |
SHA-256: | 3128948B5B4145DB9CBBC96081F7374A5AF5DE421145C05BD0038940AB8872C1 |
SHA-512: | 95B17CE111F774EECB73A4AA17B450DE2FCAF02D33F4D182E7FDF811F4831FB0C2F002A5C3F8E5D26DB6889589546227FE017C1143399B61D56DC16FC16BF12C |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.968289138836256 |
TrID: |
|
File name: | vlid_acid.exe |
File size: | 1'420'386 bytes |
MD5: | 4fd542a5d9d9fb3bf5c712d9c8798977 |
SHA1: | fdf1d0613754c4c422ecdccdcdc8e6509adbf042 |
SHA256: | dd376180de2b87377738050491d1b6d49a8a77b32c8145e7ecad56185130012d |
SHA512: | a48db2fc60b9e9ddbb522a58551c246fcb3642422901b3a4adf550f145db26ba8921fc22c3268f6113022ea19209748cf8647f63b3a7a987dbf1cb97926687e3 |
SSDEEP: | 24576:VGd2VjDuBPnI4w698ckMXmaAPmjtoJmynlRti9Xw7F1CIAGP1Ckh1rPK8:S21YPI4w6TkgmzPHcynl/WXeCcsU1v |
TLSH: | 706533D8499A8461DB54AEF660D0CD026F77FD118DCA044F9204B5DF3E63BD2BE18A2B |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8..... |
Icon Hash: | e0a1a89cca72b858 |
Entrypoint: | 0x403883 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 5 |
OS Version Minor: | 0 |
File Version Major: | 5 |
File Version Minor: | 0 |
Subsystem Version Major: | 5 |
Subsystem Version Minor: | 0 |
Import Hash: | be41bf7b8cc010b614bd36bbca606973 |
Signature Valid: | false |
Signature Issuer: | CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | D5D66EA7AE498CF896CF422DE5426590 |
Thumbprint SHA-1: | 232E8A3F99CB8B202BE4DD8A235590F838B29038 |
Thumbprint SHA-256: | 9B04FC852CDCBDA62D870E4112459D2A2A30586909E0E76B77AFA5DDF6FBA631 |
Serial: | 5600D74B2CE1156218EEA30D |
Instruction |
---|
sub esp, 000002D4h |
push ebx |
push ebp |
push esi |
push edi |
push 00000020h |
xor ebp, ebp |
pop esi |
mov dword ptr [esp+18h], ebp |
mov dword ptr [esp+10h], 00409268h |
mov dword ptr [esp+14h], ebp |
call dword ptr [00408030h] |
push 00008001h |
call dword ptr [004080B4h] |
push ebp |
call dword ptr [004082C0h] |
push 00000008h |
mov dword ptr [00472EB8h], eax |
call 00007F04B914318Bh |
push ebp |
push 000002B4h |
mov dword ptr [00472DD0h], eax |
lea eax, dword ptr [esp+38h] |
push eax |
push ebp |
push 00409264h |
call dword ptr [00408184h] |
push 0040924Ch |
push 0046ADC0h |
call 00007F04B9142E6Dh |
call dword ptr [004080B0h] |
push eax |
mov edi, 004C30A0h |
push edi |
call 00007F04B9142E5Bh |
push ebp |
call dword ptr [00408134h] |
cmp word ptr [004C30A0h], 0022h |
mov dword ptr [00472DD8h], eax |
mov eax, edi |
jne 00007F04B914075Ah |
push 00000022h |
pop esi |
mov eax, 004C30A2h |
push esi |
push eax |
call 00007F04B9142B31h |
push eax |
call dword ptr [00408260h] |
mov esi, eax |
mov dword ptr [esp+1Ch], esi |
jmp 00007F04B91407E3h |
push 00000020h |
pop ebx |
cmp ax, bx |
jne 00007F04B914075Ah |
add esi, 02h |
cmp word ptr [esi], bx |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9b34 | 0xb4 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xf4000 | 0x569ce | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x15757a | 0x36e8 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x7a000 | 0x964 | .ndata |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x8000 | 0x2d0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x6dae | 0x6e00 | 00499a6f70259150109c809d6aa0e6ed | False | 0.6611150568181818 | data | 6.508529563136936 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x8000 | 0x2a62 | 0x2c00 | 07990aaa54c3bc638bb87a87f3fb13e3 | False | 0.3526278409090909 | data | 4.390535020989255 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0xb000 | 0x67ebc | 0x200 | 014871d9a00f0e0c8c2a7cd25606c453 | False | 0.203125 | data | 1.4308602597540492 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.ndata | 0x73000 | 0x81000 | 0x0 | d41d8cd98f00b204e9800998ecf8427e | False | 0 | empty | 0.0 | IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0xf4000 | 0x569ce | 0x56a00 | ab9e65a73be419a2f3d42505f13ee868 | False | 0.970632665945166 | data | 7.872091806396193 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x14b000 | 0xf32 | 0x1000 | 7ad49776274578ba809f378cef17cda2 | False | 0.60009765625 | data | 5.516654284634532 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_ICON | 0xf4280 | 0x4906e | PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced | English | United States | 0.989960483822438 |
RT_ICON | 0x13d2f0 | 0x6fff | PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced | English | United States | 1.0005580551777058 |
RT_ICON | 0x1442f0 | 0x2538 | PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced | English | United States | 1.0011544920235096 |
RT_ICON | 0x146828 | 0x2668 | Device independent bitmap graphic, 48 x 96 x 32, image size 9792 | English | United States | 0.5620423108218063 |
RT_ICON | 0x148e90 | 0x1128 | Device independent bitmap graphic, 32 x 64 x 32, image size 4352 | English | United States | 0.6154371584699454 |
RT_ICON | 0x149fb8 | 0x468 | Device independent bitmap graphic, 16 x 32 x 32, image size 1088 | English | United States | 0.7136524822695035 |
RT_DIALOG | 0x14a420 | 0x100 | data | English | United States | 0.5234375 |
RT_DIALOG | 0x14a520 | 0x11c | data | English | United States | 0.6056338028169014 |
RT_DIALOG | 0x14a63c | 0x60 | data | English | United States | 0.7291666666666666 |
RT_GROUP_ICON | 0x14a69c | 0x5a | data | English | United States | 0.7888888888888889 |
RT_MANIFEST | 0x14a6f8 | 0x2d6 | XML 1.0 document, ASCII text, with very long lines (726), with no line terminators | English | United States | 0.5647382920110193 |
DLL | Import |
---|---|
KERNEL32.dll | SetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW |
USER32.dll | GetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW |
GDI32.dll | SetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject |
SHELL32.dll | SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation |
ADVAPI32.dll | RegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW |
COMCTL32.dll | ImageList_AddMasked, ImageList_Destroy, ImageList_Create |
ole32.dll | CoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance |
VERSION.dll | GetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T09:14:18.061931+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:18.546834+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:18.546834+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:18.993785+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:19.538336+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:19.538336+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:20.266830+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:21.342880+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:22.364636+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:23.533004+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:23.997896+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49743 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:24.485510+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:26.436081+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 172.67.190.223 | 443 | TCP |
2024-12-30T09:14:26.910270+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49745 | 172.67.190.223 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 09:14:17.609435081 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:17.609464884 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:17.609633923 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:17.612247944 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:17.612262964 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.061861992 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.061930895 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.064920902 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.064933062 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.065172911 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.116591930 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.116605997 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.116800070 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.546840906 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.546933889 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.547147036 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.548666954 CET | 49735 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.548681021 CET | 443 | 49735 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.555404902 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.555438042 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.555682898 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.556967020 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.556979895 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.993695021 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.993784904 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.996153116 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:18.996160030 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:18.996478081 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.007869005 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.007889032 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.007949114 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538362026 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538423061 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538461924 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538474083 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.538486004 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538556099 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538594007 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538595915 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.538606882 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538630009 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.538695097 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538732052 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.538734913 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538743973 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538784981 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.538789988 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.538842916 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.540205002 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.540210009 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545034885 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545077085 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545121908 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.545125961 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545161963 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.545165062 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545176983 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.545218945 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.578859091 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.578874111 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.578882933 CET | 49738 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.578887939 CET | 443 | 49738 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.822302103 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.822333097 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:19.822405100 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.822750092 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:19.822767019 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.266756058 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.266829967 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.268261909 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.268269062 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.268498898 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.274734020 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.274933100 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.274969101 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.275029898 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.275038004 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.866544962 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.866646051 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.866796970 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.866925001 CET | 49740 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.866939068 CET | 443 | 49740 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.885137081 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.885179996 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:20.885590076 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.885590076 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:20.885622978 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.341521025 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.342880011 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.342880011 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.342900991 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.343215942 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.351974010 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.351974010 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.352011919 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.838860035 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.838958025 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.839591026 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.839591026 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.919909954 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.919987917 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:21.920074940 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.920375109 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:21.920393944 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.150002003 CET | 49741 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.150049925 CET | 443 | 49741 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.364553928 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.364635944 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.379256964 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.379278898 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.379494905 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.389250040 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.389393091 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.389424086 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.389494896 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.389506102 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.987818956 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.987926006 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:22.988012075 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.988218069 CET | 49742 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:22.988230944 CET | 443 | 49742 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.067581892 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.067624092 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.067691088 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.067994118 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.068007946 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.532911062 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.533004045 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.537604094 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.537614107 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.537842035 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.539383888 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.539480925 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.539485931 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.997900009 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.997992039 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:23.998128891 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.998262882 CET | 49743 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:23.998281002 CET | 443 | 49743 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.041018963 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.041059971 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.041156054 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.041428089 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.041445017 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.485423088 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.485510111 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.487133026 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.487164021 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.487499952 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:24.488585949 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.488667011 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:24.488679886 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:25.977309942 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:25.977468014 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:25.977550983 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:25.977725983 CET | 49744 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:25.977768898 CET | 443 | 49744 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:25.979695082 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:25.979739904 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:25.979830027 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:25.980127096 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:25.980140924 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.436009884 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.436080933 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.437522888 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.437531948 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.437908888 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.444261074 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.444281101 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.444381952 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.910295010 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.910419941 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.910466909 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.910639048 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.910654068 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Dec 30, 2024 09:14:26.910670996 CET | 49745 | 443 | 192.168.2.4 | 172.67.190.223 |
Dec 30, 2024 09:14:26.910681963 CET | 443 | 49745 | 172.67.190.223 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 09:14:03.656044960 CET | 61232 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 30, 2024 09:14:03.664870977 CET | 53 | 61232 | 1.1.1.1 | 192.168.2.4 |
Dec 30, 2024 09:14:17.590101004 CET | 57125 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 30, 2024 09:14:17.603490114 CET | 53 | 57125 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 30, 2024 09:14:03.656044960 CET | 192.168.2.4 | 1.1.1.1 | 0xd5a8 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 30, 2024 09:14:17.590101004 CET | 192.168.2.4 | 1.1.1.1 | 0x8035 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 30, 2024 09:14:03.664870977 CET | 1.1.1.1 | 192.168.2.4 | 0xd5a8 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 30, 2024 09:14:17.603490114 CET | 1.1.1.1 | 192.168.2.4 | 0x8035 | No error (0) | 172.67.190.223 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 09:14:17.603490114 CET | 1.1.1.1 | 192.168.2.4 | 0x8035 | No error (0) | 104.21.92.91 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49735 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:18 UTC | 262 | OUT | |
2024-12-30 08:14:18 UTC | 8 | OUT | |
2024-12-30 08:14:18 UTC | 1129 | IN | |
2024-12-30 08:14:18 UTC | 7 | IN | |
2024-12-30 08:14:18 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49738 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:19 UTC | 263 | OUT | |
2024-12-30 08:14:19 UTC | 86 | OUT | |
2024-12-30 08:14:19 UTC | 1131 | IN | |
2024-12-30 08:14:19 UTC | 238 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 354 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN | |
2024-12-30 08:14:19 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49740 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:20 UTC | 278 | OUT | |
2024-12-30 08:14:20 UTC | 15331 | OUT | |
2024-12-30 08:14:20 UTC | 2821 | OUT | |
2024-12-30 08:14:20 UTC | 1133 | IN | |
2024-12-30 08:14:20 UTC | 20 | IN | |
2024-12-30 08:14:20 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49741 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:21 UTC | 274 | OUT | |
2024-12-30 08:14:21 UTC | 8755 | OUT | |
2024-12-30 08:14:21 UTC | 1125 | IN | |
2024-12-30 08:14:21 UTC | 20 | IN | |
2024-12-30 08:14:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49742 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:22 UTC | 274 | OUT | |
2024-12-30 08:14:22 UTC | 15331 | OUT | |
2024-12-30 08:14:22 UTC | 5071 | OUT | |
2024-12-30 08:14:22 UTC | 1135 | IN | |
2024-12-30 08:14:22 UTC | 20 | IN | |
2024-12-30 08:14:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49743 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:23 UTC | 273 | OUT | |
2024-12-30 08:14:23 UTC | 1213 | OUT | |
2024-12-30 08:14:23 UTC | 1128 | IN | |
2024-12-30 08:14:23 UTC | 20 | IN | |
2024-12-30 08:14:23 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49744 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:24 UTC | 279 | OUT | |
2024-12-30 08:14:24 UTC | 1133 | OUT | |
2024-12-30 08:14:25 UTC | 1121 | IN | |
2024-12-30 08:14:25 UTC | 20 | IN | |
2024-12-30 08:14:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49745 | 172.67.190.223 | 443 | 5776 | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 08:14:26 UTC | 264 | OUT | |
2024-12-30 08:14:26 UTC | 121 | OUT | |
2024-12-30 08:14:26 UTC | 1122 | IN | |
2024-12-30 08:14:26 UTC | 54 | IN | |
2024-12-30 08:14:26 UTC | 5 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 03:13:57 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\vlid_acid.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 1'420'386 bytes |
MD5 hash: | 4FD542A5D9D9FB3BF5C712D9C8798977 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 03:13:58 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 03:13:58 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 03:14:00 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x480000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 4 |
Start time: | 03:14:00 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x940000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 5 |
Start time: | 03:14:00 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\tasklist.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x480000 |
File size: | 79'360 bytes |
MD5 hash: | 0A4448B31CE7F83CB7691A2657F330F1 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 6 |
Start time: | 03:14:00 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x940000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 7 |
Start time: | 03:14:01 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 8 |
Start time: | 03:14:01 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\extrac32.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xdc0000 |
File size: | 29'184 bytes |
MD5 hash: | 9472AAB6390E4F1431BAA912FCFF9707 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | moderate |
Has exited: | true |
Target ID: | 9 |
Start time: | 03:14:01 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\findstr.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x940000 |
File size: | 29'696 bytes |
MD5 hash: | F1D4BE0E99EC734376FDE474A8D4EA3E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 10 |
Start time: | 03:14:01 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 11 |
Start time: | 03:14:02 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\cmd.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x240000 |
File size: | 236'544 bytes |
MD5 hash: | D0FCE3AFA6AA1D58CE9FA336CC2B675B |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 12 |
Start time: | 03:14:02 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\170898\Heard.com |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd20000 |
File size: | 947'288 bytes |
MD5 hash: | 62D09F076E6E0240548C2F837536A46A |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Antivirus matches: |
|
Has exited: | true |
Target ID: | 13 |
Start time: | 03:14:02 |
Start date: | 30/12/2024 |
Path: | C:\Windows\SysWOW64\choice.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x800000 |
File size: | 28'160 bytes |
MD5 hash: | FCE0E41C87DC4ABBE976998AD26C27E4 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Has exited: | true |
Target ID: | 16 |
Start time: | 03:14:22 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | false |
Programmed in: | C, C++ or other language |
Has exited: | true |
Execution Graph
Execution Coverage: | 18.6% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 20.7% |
Total number of Nodes: | 1525 |
Total number of Limit Nodes: | 33 |
Graph
Function 004050CD Relevance: 68.5, APIs: 36, Strings: 3, Instructions: 295windowclipboardmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403883 Relevance: 54.6, APIs: 22, Strings: 9, Instructions: 304filestringcomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406805 Relevance: 21.2, APIs: 8, Strings: 4, Instructions: 212stringCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004074BB Relevance: 5.4, APIs: 4, Instructions: 382COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062D5 Relevance: 3.0, APIs: 2, Instructions: 14fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405479 Relevance: 58.1, APIs: 32, Strings: 1, Instructions: 345windowstringCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004015A0 Relevance: 56.4, APIs: 15, Strings: 17, Instructions: 351sleepfilewindowCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040592C Relevance: 45.7, APIs: 15, Strings: 11, Instructions: 233stringregistrylibraryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401A1F Relevance: 22.9, APIs: 5, Strings: 8, Instructions: 185stringtimeCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040337F Relevance: 17.7, APIs: 6, Strings: 4, Instructions: 166fileCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004022FD Relevance: 7.6, APIs: 5, Instructions: 56memoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004078C5 Relevance: 5.2, APIs: 4, Instructions: 238COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407AC3 Relevance: 5.2, APIs: 4, Instructions: 211COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407312 Relevance: 5.2, APIs: 4, Instructions: 201COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407752 Relevance: 5.2, APIs: 4, Instructions: 179COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407854 Relevance: 5.2, APIs: 4, Instructions: 169COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004077B2 Relevance: 5.2, APIs: 4, Instructions: 166COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407C5F Relevance: 5.2, APIs: 4, Instructions: 156memoryCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040139D Relevance: 3.0, APIs: 2, Instructions: 42windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E50 Relevance: 3.0, APIs: 2, Instructions: 15fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405E30 Relevance: 3.0, APIs: 2, Instructions: 9COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403336 Relevance: 1.5, APIs: 1, Instructions: 22fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004037CC Relevance: 1.5, APIs: 1, Instructions: 20COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DAF Relevance: 1.5, APIs: 1, Instructions: 9windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403368 Relevance: 1.5, APIs: 1, Instructions: 6COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D98 Relevance: 1.5, APIs: 1, Instructions: 6windowCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403D85 Relevance: 1.5, APIs: 1, Instructions: 4COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040497C Relevance: 65.2, APIs: 33, Strings: 4, Instructions: 470windowmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004044A5 Relevance: 33.6, APIs: 15, Strings: 4, Instructions: 300stringkeyboardCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406ED2 Relevance: 30.0, APIs: 14, Strings: 3, Instructions: 270filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406C9B Relevance: 29.9, APIs: 9, Strings: 8, Instructions: 190filestringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E18 Relevance: 1.5, APIs: 1, Instructions: 27fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004063AC Relevance: 70.3, APIs: 29, Strings: 11, Instructions: 256libraryloadermemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004040B8 Relevance: 40.5, APIs: 20, Strings: 3, Instructions: 210windowstringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406A99 Relevance: 33.4, APIs: 15, Strings: 4, Instructions: 163filestringmemoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402880 Relevance: 17.6, APIs: 4, Strings: 6, Instructions: 131registrystringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402E55 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 103memoryfileCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004060E7 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 72filestringCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00403DCA Relevance: 12.1, APIs: 8, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004023F0 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 83libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402238 Relevance: 10.6, APIs: 3, Strings: 3, Instructions: 59synchronizationCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040484E Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 48windowCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040324C Relevance: 10.5, APIs: 5, Strings: 1, Instructions: 40timeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004043AD Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 73stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040209F Relevance: 7.5, APIs: 5, Instructions: 39windowCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00401F80 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 84windowtimeCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004027E3 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 60registryCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004048CC Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 58windowCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402665 Relevance: 7.1, APIs: 3, Strings: 1, Instructions: 56stringCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406224 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 53stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004020F9 Relevance: 6.0, APIs: 4, Instructions: 45COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004071F8 Relevance: 6.0, APIs: 3, Strings: 1, Instructions: 43stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004032D2 Relevance: 6.0, APIs: 4, Instructions: 33COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00406365 Relevance: 6.0, APIs: 4, Instructions: 31memorylibraryloaderCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00402797 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 25stringCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405C3F Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 24processCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004062A3 Relevance: 5.3, APIs: 2, Strings: 1, Instructions: 13stringCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00405DB6 Relevance: 5.0, APIs: 4, Instructions: 37stringCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|