Windows
Analysis Report
GTA-5-Mod-Menu-2025.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- GTA-5-Mod-Menu-2025.exe (PID: 5276 cmdline:
"C:\Users\ user\Deskt op\GTA-5-M od-Menu-20 25.exe" MD5: 97098E0B103ACDF642B87D2B96155992) - conhost.exe (PID: 5800 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - GTA-5-Mod-Menu-2025.exe (PID: 64 cmdline:
"C:\Users\ user\Deskt op\GTA-5-M od-Menu-20 25.exe" MD5: 97098E0B103ACDF642B87D2B96155992) - GTA-5-Mod-Menu-2025.exe (PID: 6216 cmdline:
"C:\Users\ user\Deskt op\GTA-5-M od-Menu-20 25.exe" MD5: 97098E0B103ACDF642B87D2B96155992)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": "https://fancywaxxers.shop/api", "Build Version": "yau6Na--899083440"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:40:58.501835+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:40:59.471486+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:01.036591+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:02.335243+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:03.475678+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:05.142811+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:08.394830+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49712 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:10.624047+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49728 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:40:58.976794+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:00.222152+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:11.080134+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49728 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:40:58.976794+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:41:00.222152+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:41:07.345131+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49710 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Code function: | 4_2_004153E8 |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00F9B6A8 | |
Source: | Code function: | 0_2_00F9B759 | |
Source: | Code function: | 3_2_00F9B6A8 | |
Source: | Code function: | 3_2_00F9B759 |
Source: | Code function: | 4_2_00437960 | |
Source: | Code function: | 4_2_00422111 | |
Source: | Code function: | 4_2_00426260 | |
Source: | Code function: | 4_2_0043D2F7 | |
Source: | Code function: | 4_2_0043DBCD | |
Source: | Code function: | 4_2_00409BE0 | |
Source: | Code function: | 4_2_004153E8 | |
Source: | Code function: | 4_2_004153E8 | |
Source: | Code function: | 4_2_0043FC30 | |
Source: | Code function: | 4_2_0042BE7C | |
Source: | Code function: | 4_2_0043CFAA | |
Source: | Code function: | 4_2_0042786F | |
Source: | Code function: | 4_2_0042A870 | |
Source: | Code function: | 4_2_00414804 | |
Source: | Code function: | 4_2_00414804 | |
Source: | Code function: | 4_2_00414804 | |
Source: | Code function: | 4_2_00409010 | |
Source: | Code function: | 4_2_0041C8D5 | |
Source: | Code function: | 4_2_0043F8A0 | |
Source: | Code function: | 4_2_0041C8BE | |
Source: | Code function: | 4_2_00438950 | |
Source: | Code function: | 4_2_00418166 | |
Source: | Code function: | 4_2_00418166 | |
Source: | Code function: | 4_2_00418166 | |
Source: | Code function: | 4_2_00416913 | |
Source: | Code function: | 4_2_004029E0 | |
Source: | Code function: | 4_2_0041D9B0 | |
Source: | Code function: | 4_2_004219B0 | |
Source: | Code function: | 4_2_004219B0 | |
Source: | Code function: | 4_2_004219B0 | |
Source: | Code function: | 4_2_0040C252 | |
Source: | Code function: | 4_2_00424A08 | |
Source: | Code function: | 4_2_0041BA29 | |
Source: | Code function: | 4_2_0041B22A | |
Source: | Code function: | 4_2_0041B22A | |
Source: | Code function: | 4_2_004292F3 | |
Source: | Code function: | 4_2_00414280 | |
Source: | Code function: | 4_2_00414280 | |
Source: | Code function: | 4_2_00428BF0 | |
Source: | Code function: | 4_2_0043BB80 | |
Source: | Code function: | 4_2_0043BB80 | |
Source: | Code function: | 4_2_0043BB80 | |
Source: | Code function: | 4_2_00419440 | |
Source: | Code function: | 4_2_00419440 | |
Source: | Code function: | 4_2_00427449 | |
Source: | Code function: | 4_2_00427472 | |
Source: | Code function: | 4_2_0040CC10 | |
Source: | Code function: | 4_2_00407430 | |
Source: | Code function: | 4_2_00407430 | |
Source: | Code function: | 4_2_0041ACDA | |
Source: | Code function: | 4_2_0041BCF0 | |
Source: | Code function: | 4_2_0041BCF0 | |
Source: | Code function: | 4_2_00423C80 | |
Source: | Code function: | 4_2_0041B497 | |
Source: | Code function: | 4_2_0041B497 | |
Source: | Code function: | 4_2_0041B5B9 | |
Source: | Code function: | 4_2_00429E60 | |
Source: | Code function: | 4_2_00428630 | |
Source: | Code function: | 4_2_00428630 | |
Source: | Code function: | 4_2_00409690 | |
Source: | Code function: | 4_2_00438690 | |
Source: | Code function: | 4_2_00434E90 | |
Source: | Code function: | 4_2_0042AF4D | |
Source: | Code function: | 4_2_0040A706 | |
Source: | Code function: | 4_2_0040A4B5 | |
Source: | Code function: | 4_2_00428F1F | |
Source: | Code function: | 4_2_00414F27 | |
Source: | Code function: | 4_2_00427F32 | |
Source: | Code function: | 4_2_0042CF3F | |
Source: | Code function: | 4_2_0041A7C6 | |
Source: | Code function: | 4_2_0042AFEA | |
Source: | Code function: | 4_2_0040DF82 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: |
Source: | IP Address: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 4_2_00432280 |
Source: | Code function: | 4_2_05AD1000 |
Source: | Code function: | 4_2_00432280 |
Source: | Code function: | 4_2_004328F0 |
Source: | Code function: | 0_2_00F9EA4E | |
Source: | Code function: | 0_2_00FA04C2 | |
Source: | Code function: | 0_2_00F93400 | |
Source: | Code function: | 0_2_00F8DDA2 | |
Source: | Code function: | 0_2_00F8969B | |
Source: | Code function: | 3_2_00F9EA4E | |
Source: | Code function: | 3_2_00FA04C2 | |
Source: | Code function: | 3_2_00F93400 | |
Source: | Code function: | 3_2_00F8DDA2 | |
Source: | Code function: | 3_2_00F8969B | |
Source: | Code function: | 4_2_00437960 | |
Source: | Code function: | 4_2_00422111 | |
Source: | Code function: | 4_2_0043F1A0 | |
Source: | Code function: | 4_2_00426260 | |
Source: | Code function: | 4_2_0043026B | |
Source: | Code function: | 4_2_0043B270 | |
Source: | Code function: | 4_2_0040BB47 | |
Source: | Code function: | 4_2_00409BE0 | |
Source: | Code function: | 4_2_004153E8 | |
Source: | Code function: | 4_2_0040D3F6 | |
Source: | Code function: | 4_2_0043FC30 | |
Source: | Code function: | 4_2_00437C80 | |
Source: | Code function: | 4_2_00420DE0 | |
Source: | Code function: | 4_2_00440660 | |
Source: | Code function: | 4_2_0042BE7C | |
Source: | Code function: | 4_2_00411E10 | |
Source: | Code function: | 4_2_0041071B | |
Source: | Code function: | 4_2_00408780 | |
Source: | Code function: | 4_2_0042F050 | |
Source: | Code function: | 4_2_00432010 | |
Source: | Code function: | 4_2_00440820 | |
Source: | Code function: | 4_2_004240C3 | |
Source: | Code function: | 4_2_0043E8C0 | |
Source: | Code function: | 4_2_004238EB | |
Source: | Code function: | 4_2_00439080 | |
Source: | Code function: | 4_2_0043F8A0 | |
Source: | Code function: | 4_2_00403940 | |
Source: | Code function: | 4_2_00438950 | |
Source: | Code function: | 4_2_00405960 | |
Source: | Code function: | 4_2_0042A160 | |
Source: | Code function: | 4_2_00418166 | |
Source: | Code function: | 4_2_00416913 | |
Source: | Code function: | 4_2_0043611F | |
Source: | Code function: | 4_2_004061C0 | |
Source: | Code function: | 4_2_0040A9C0 | |
Source: | Code function: | 4_2_004281D3 | |
Source: | Code function: | 4_2_004371D0 | |
Source: | Code function: | 4_2_004081E0 | |
Source: | Code function: | 4_2_004259E0 | |
Source: | Code function: | 4_2_0040B1A5 | |
Source: | Code function: | 4_2_0041D9B0 | |
Source: | Code function: | 4_2_004219B0 | |
Source: | Code function: | 4_2_00409270 | |
Source: | Code function: | 4_2_0042EA71 | |
Source: | Code function: | 4_2_00424A08 | |
Source: | Code function: | 4_2_0042E209 | |
Source: | Code function: | 4_2_00422A31 | |
Source: | Code function: | 4_2_00439235 | |
Source: | Code function: | 4_2_00415AD0 | |
Source: | Code function: | 4_2_004162DD | |
Source: | Code function: | 4_2_004042F0 | |
Source: | Code function: | 4_2_004292F3 | |
Source: | Code function: | 4_2_00414280 | |
Source: | Code function: | 4_2_0043EB60 | |
Source: | Code function: | 4_2_00436B67 | |
Source: | Code function: | 4_2_00411377 | |
Source: | Code function: | 4_2_0041F3DA | |
Source: | Code function: | 4_2_0041D3E0 | |
Source: | Code function: | 4_2_0043BB80 | |
Source: | Code function: | 4_2_00402BA0 | |
Source: | Code function: | 4_2_00419440 | |
Source: | Code function: | 4_2_00427449 | |
Source: | Code function: | 4_2_0042F45F | |
Source: | Code function: | 4_2_00448460 | |
Source: | Code function: | 4_2_00427472 | |
Source: | Code function: | 4_2_00420470 | |
Source: | Code function: | 4_2_00417C0E | |
Source: | Code function: | 4_2_00407430 | |
Source: | Code function: | 4_2_00404C30 | |
Source: | Code function: | 4_2_00437430 | |
Source: | Code function: | 4_2_0042C4D2 | |
Source: | Code function: | 4_2_0043F4D0 | |
Source: | Code function: | 4_2_0040E4DE | |
Source: | Code function: | 4_2_0041BCF0 | |
Source: | Code function: | 4_2_0041CC80 | |
Source: | Code function: | 4_2_0043CC95 | |
Source: | Code function: | 4_2_00430540 | |
Source: | Code function: | 4_2_0042C559 | |
Source: | Code function: | 4_2_0041A570 | |
Source: | Code function: | 4_2_00427D0D | |
Source: | Code function: | 4_2_00418DC3 | |
Source: | Code function: | 4_2_0042FDDC | |
Source: | Code function: | 4_2_004265E0 | |
Source: | Code function: | 4_2_0042C5EC | |
Source: | Code function: | 4_2_00406650 | |
Source: | Code function: | 4_2_00431E00 | |
Source: | Code function: | 4_2_00416E0E | |
Source: | Code function: | 4_2_00405E20 | |
Source: | Code function: | 4_2_00428630 | |
Source: | Code function: | 4_2_00446EC7 | |
Source: | Code function: | 4_2_00446ECF | |
Source: | Code function: | 4_2_00446ECB | |
Source: | Code function: | 4_2_00446ED3 | |
Source: | Code function: | 4_2_00446EF7 | |
Source: | Code function: | 4_2_00409690 | |
Source: | Code function: | 4_2_00438690 | |
Source: | Code function: | 4_2_00446EAE | |
Source: | Code function: | 4_2_00426EBC | |
Source: | Code function: | 4_2_00402F40 | |
Source: | Code function: | 4_2_0042B76F | |
Source: | Code function: | 4_2_0043E770 | |
Source: | Code function: | 4_2_00422732 | |
Source: | Code function: | 4_2_00427F32 | |
Source: | Code function: | 4_2_0041A7C6 | |
Source: | Code function: | 4_2_0040AFF2 | |
Source: | Code function: | 4_2_0040F7F9 | |
Source: | Code function: | 4_2_0041D780 | |
Source: | Code function: | 4_2_00446FA0 | |
Source: | Code function: | 4_2_004357B3 |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 4_2_00437C80 |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00F89D7D | |
Source: | Code function: | 3_2_00F89D7D | |
Source: | Code function: | 4_2_004454B1 | |
Source: | Code function: | 4_2_0044466C | |
Source: | Code function: | 4_2_0043E741 | |
Source: | Code function: | 4_2_004447D9 |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00F9B6A8 | |
Source: | Code function: | 0_2_00F9B759 | |
Source: | Code function: | 3_2_00F9B6A8 | |
Source: | Code function: | 3_2_00F9B759 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_4-14492 |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 4_2_0043CF30 |
Source: | Code function: | 0_2_00F89A33 |
Source: | Code function: | 0_2_00FB019E | |
Source: | Code function: | 0_2_00F81BA0 | |
Source: | Code function: | 3_2_00F81BA0 |
Source: | Code function: | 0_2_00F96FE0 |
Source: | Code function: | 0_2_00F89A33 | |
Source: | Code function: | 0_2_00F91A20 | |
Source: | Code function: | 0_2_00F89A27 | |
Source: | Code function: | 0_2_00F89673 | |
Source: | Code function: | 3_2_00F89A33 | |
Source: | Code function: | 3_2_00F91A20 | |
Source: | Code function: | 3_2_00F89A27 | |
Source: | Code function: | 3_2_00F89673 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00FB019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00F9B0D0 | |
Source: | Code function: | 0_2_00F968BD | |
Source: | Code function: | 0_2_00F9B085 | |
Source: | Code function: | 0_2_00F9A9F7 | |
Source: | Code function: | 0_2_00F9B177 | |
Source: | Code function: | 0_2_00F9B27D | |
Source: | Code function: | 0_2_00F963B5 | |
Source: | Code function: | 0_2_00F9ACF0 | |
Source: | Code function: | 0_2_00F9AC48 | |
Source: | Code function: | 0_2_00F9AFB0 | |
Source: | Code function: | 0_2_00F9AF43 | |
Source: | Code function: | 3_2_00F9B0D0 | |
Source: | Code function: | 3_2_00F968BD | |
Source: | Code function: | 3_2_00F9B085 | |
Source: | Code function: | 3_2_00F9A9F7 | |
Source: | Code function: | 3_2_00F9B177 | |
Source: | Code function: | 3_2_00F9B27D | |
Source: | Code function: | 3_2_00F963B5 | |
Source: | Code function: | 3_2_00F9ACF0 | |
Source: | Code function: | 3_2_00F9AC48 | |
Source: | Code function: | 3_2_00F9AFB0 | |
Source: | Code function: | 3_2_00F9AF43 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00F8A2F5 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Screen Capture | 21 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 241 Security Software Discovery | Remote Desktop Protocol | 1 Archive Collected Data | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | 31 Data from Local System | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 3 Obfuscated Files or Information | NTDS | 1 Process Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Application Window Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 11 File and Directory Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 33 System Information Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
32% | ReversingLabs | Win32.Trojan.Generic | ||
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
fancywaxxers.shop | 104.21.96.1 | true | false | high |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
true |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
104.21.96.1 | fancywaxxers.shop | United States | 13335 | CLOUDFLARENETUS | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582531 |
Start date and time: | 2024-12-30 20:40:08 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 49s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 9 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | GTA-5-Mod-Menu-2025.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
- Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target GTA-5-Mod-Menu-2025.exe, PID 64 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: GTA-5-Mod-Menu-2025.exe
Time | Type | Description |
---|---|---|
14:40:58 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
104.21.96.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
fancywaxxers.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | KnowBe4 | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | SmokeLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, DarkTortilla, LummaC Stealer, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.822135248890638 |
TrID: |
|
File name: | GTA-5-Mod-Menu-2025.exe |
File size: | 820'736 bytes |
MD5: | 97098e0b103acdf642b87d2b96155992 |
SHA1: | e6ffd40917dcb773e6cd7a9dba339cf967498c8a |
SHA256: | cec32b81cc4dfb722928389bea59758bfe275da7b36732512d887a845053e191 |
SHA512: | 87cb9a9394ef39a3728933ba21a81089f1982c5f7a563104bbb64c984b57bbc0d0945fe514f71b2f37df526606d22ea6566be9ab8e18d1e25234052f05d68744 |
SSDEEP: | 12288:ou4dP5M4Q2MmbFsgMH+GsGde1vy0xt4K7wam97DFsgMH+GsGde1vy0xt4K7wam9x:t4dPpQPmPMH4Koqq697nMH4Koqq697N |
TLSH: | E4050252B650C0B2C9B3117255F5DBB6493EBA214F317ECF67980FAE4E311E15A30B2A |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....rg.................H........................@.......................................@.....................................(.. |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x40a2a0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6772AADA [Mon Dec 30 14:14:50 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | d6bfc0ff235c28cc21f6045af30834e6 |
Instruction |
---|
call 00007FF42967A32Ah |
jmp 00007FF42967A18Dh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007FF42967A326h |
test esi, ecx |
jne 00007FF42967A348h |
call 00007FF42967A351h |
mov ecx, eax |
cmp ecx, edi |
jne 00007FF42967A329h |
mov ecx, BB40E64Fh |
jmp 00007FF42967A330h |
test esi, ecx |
jne 00007FF42967A32Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E8C8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E884h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E880h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E910h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431AB8h |
call dword ptr [0042E8E8h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e6ac | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x34000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x1b80 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e820 | 0x14c | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x2479a | 0x24800 | e99bb4e274380b09613559d3b1a664fb | False | 0.554781142979452 | data | 6.559742159760055 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9eb4 | 0xa000 | 3f1d7f6413abea491661acb746eefebf | False | 0.428271484375 | DOS executable (COM) | 4.91372050063646 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2280 | 0x1600 | 112d0c9e43893ae5b7f96d23807996ac | False | 0.39506392045454547 | data | 4.581141173428789 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x33000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x34000 | 0xe8 | 0x200 | 03d6bf5d1e31277fc8fb90374111d794 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1b80 | 0x1c00 | 6e4c901089600f702531dbe2643a65b6 | False | 0.7770647321428571 | data | 6.526735403310053 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x37000 | 0x4b000 | 0x4b000 | 935c377743f9d6031645984e06824d03 | False | 1.0003287760416666 | data | 7.999502416028787 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.BSS | 0x82000 | 0x4b000 | 0x4b000 | 935c377743f9d6031645984e06824d03 | False | 1.0003287760416666 | data | 7.999502416028787 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x34060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeConsole, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-30T20:40:58.501835+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:40:58.976794+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:40:58.976794+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:40:59.471486+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:00.222152+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:00.222152+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:01.036591+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49707 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:02.335243+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49708 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:03.475678+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49709 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:05.142811+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:07.345131+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49710 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:08.394830+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49712 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:10.624047+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49728 | 104.21.96.1 | 443 | TCP |
2024-12-30T20:41:11.080134+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49728 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 20:40:57.967700958 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:57.967746973 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:57.967817068 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:57.993355989 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:57.993387938 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.501733065 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.501835108 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.508624077 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.508641005 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.508944035 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.557790995 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.561202049 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.561242104 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.561309099 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.976809025 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.976897955 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.977001905 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.978992939 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.979001999 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.979020119 CET | 49705 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.979028940 CET | 443 | 49705 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.997263908 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.997298956 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:58.997378111 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.997720957 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:58.997733116 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:59.471405029 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:59.471486092 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:59.473465919 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:59.473478079 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:59.473733902 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:40:59.475121975 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:59.475155115 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:40:59.475191116 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222165108 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222235918 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222268105 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222289085 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.222310066 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222347975 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222352028 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.222357988 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222397089 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222399950 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.222430944 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.222476006 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.222830057 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.226825953 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.226860046 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.226877928 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.226886034 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.226932049 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.330408096 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.330462933 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.330523968 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.330534935 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.330552101 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.330595016 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.331063032 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.331077099 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.331103086 CET | 49706 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.331130028 CET | 443 | 49706 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.549524069 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.549556971 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:00.549618006 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.550287962 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:00.550302982 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.036508083 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.036591053 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.085710049 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.085731030 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.086051941 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.129775047 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.148863077 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.148912907 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.736769915 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.736864090 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.737056017 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.737158060 CET | 49707 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.737173080 CET | 443 | 49707 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.869299889 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.869340897 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:01.869431019 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.869796038 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:01.869811058 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.335150003 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.335242987 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.336582899 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.336591005 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.336843967 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.338184118 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.338344097 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.338376999 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.338428020 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.383338928 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.826580048 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.826668024 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:02.826730967 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.826895952 CET | 49708 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:02.826904058 CET | 443 | 49708 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.019201040 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.019224882 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.019288063 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.019625902 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.019638062 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.475584030 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.475677967 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.478055000 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.478060961 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.478305101 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.526578903 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.570506096 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.570672989 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.570694923 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:03.570770025 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:03.570775986 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:04.195075989 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:04.195168018 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:04.195239067 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:04.195441008 CET | 49709 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:04.195452929 CET | 443 | 49709 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:04.667855024 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:04.667880058 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:04.667953968 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:04.668363094 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:04.668378115 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:05.142685890 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:05.142811060 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:05.144494057 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:05.144504070 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:05.144769907 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:05.146132946 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:05.146240950 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:05.146248102 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:07.345124960 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:07.345233917 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:07.345290899 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:07.345539093 CET | 49710 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:07.345550060 CET | 443 | 49710 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:07.878645897 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:07.878669977 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:07.878736973 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:07.879101992 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:07.879112959 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.394697905 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.394829988 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.396287918 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.396295071 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.396543026 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.397914886 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.398691893 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.398731947 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.399113894 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.399157047 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.399264097 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.399288893 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.399399996 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.399420023 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.399568081 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.399595022 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.399732113 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.399768114 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.408046007 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.408185959 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.408216000 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.408233881 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.408350945 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.408385992 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.409312010 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.409528017 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.409549952 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:08.409565926 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.409598112 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.409641981 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:08.414410114 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.150707006 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.150790930 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.150928020 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.151221991 CET | 49712 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.151233912 CET | 443 | 49712 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.167701960 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.167720079 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.167793036 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.168066978 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.168080091 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.623967886 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.624047041 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.625588894 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.625597000 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.625834942 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:10.629113913 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.629153013 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:10.629189014 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080161095 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080209970 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080241919 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080260038 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.080272913 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080316067 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.080322027 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080429077 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080466032 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.080472946 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080852985 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080883026 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080893993 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.080904007 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.080943108 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.084852934 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.084937096 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.084985018 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.183979988 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.183993101 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Dec 30, 2024 20:41:11.184005976 CET | 49728 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 30, 2024 20:41:11.184010983 CET | 443 | 49728 | 104.21.96.1 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 30, 2024 20:40:57.951416969 CET | 56022 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 30, 2024 20:40:57.962029934 CET | 53 | 56022 | 1.1.1.1 | 192.168.2.6 |
Dec 30, 2024 20:41:16.536076069 CET | 53 | 54710 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 30, 2024 20:40:57.951416969 CET | 192.168.2.6 | 1.1.1.1 | 0x2ed6 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 30, 2024 20:40:57.962029934 CET | 1.1.1.1 | 192.168.2.6 | 0x2ed6 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49705 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:40:58 UTC | 264 | OUT | |
2024-12-30 19:40:58 UTC | 8 | OUT | |
2024-12-30 19:40:58 UTC | 1133 | IN | |
2024-12-30 19:40:58 UTC | 7 | IN | |
2024-12-30 19:40:58 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49706 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:40:59 UTC | 265 | OUT | |
2024-12-30 19:40:59 UTC | 51 | OUT | |
2024-12-30 19:41:00 UTC | 1128 | IN | |
2024-12-30 19:41:00 UTC | 241 | IN | |
2024-12-30 19:41:00 UTC | 892 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN | |
2024-12-30 19:41:00 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49707 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:01 UTC | 276 | OUT | |
2024-12-30 19:41:01 UTC | 12821 | OUT | |
2024-12-30 19:41:01 UTC | 1142 | IN | |
2024-12-30 19:41:01 UTC | 20 | IN | |
2024-12-30 19:41:01 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49708 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:02 UTC | 273 | OUT | |
2024-12-30 19:41:02 UTC | 15049 | OUT | |
2024-12-30 19:41:02 UTC | 1138 | IN | |
2024-12-30 19:41:02 UTC | 20 | IN | |
2024-12-30 19:41:02 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49709 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:03 UTC | 273 | OUT | |
2024-12-30 19:41:03 UTC | 15331 | OUT | |
2024-12-30 19:41:03 UTC | 4576 | OUT | |
2024-12-30 19:41:04 UTC | 1135 | IN | |
2024-12-30 19:41:04 UTC | 20 | IN | |
2024-12-30 19:41:04 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49710 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:05 UTC | 276 | OUT | |
2024-12-30 19:41:05 UTC | 1220 | OUT | |
2024-12-30 19:41:07 UTC | 1129 | IN | |
2024-12-30 19:41:07 UTC | 20 | IN | |
2024-12-30 19:41:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49712 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:08 UTC | 282 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:08 UTC | 15331 | OUT | |
2024-12-30 19:41:10 UTC | 1145 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49728 | 104.21.96.1 | 443 | 6216 | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-30 19:41:10 UTC | 265 | OUT | |
2024-12-30 19:41:10 UTC | 86 | OUT | |
2024-12-30 19:41:11 UTC | 1131 | IN | |
2024-12-30 19:41:11 UTC | 238 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN | |
2024-12-30 19:41:11 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 14:40:56 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf80000 |
File size: | 820'736 bytes |
MD5 hash: | 97098E0B103ACDF642B87D2B96155992 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 14:40:56 |
Start date: | 30/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 3 |
Start time: | 14:40:57 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xf80000 |
File size: | 820'736 bytes |
MD5 hash: | 97098E0B103ACDF642B87D2B96155992 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 4 |
Start time: | 14:40:57 |
Start date: | 30/12/2024 |
Path: | C:\Users\user\Desktop\GTA-5-Mod-Menu-2025.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xf80000 |
File size: | 820'736 bytes |
MD5 hash: | 97098E0B103ACDF642B87D2B96155992 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 8.1% |
Dynamic/Decrypted Code Coverage: | 0.4% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 26 |
Graph
Function 00FB019E Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F81C10 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F96602 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F96DEA Relevance: 7.7, APIs: 5, Instructions: 197COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F81DB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F97268 Relevance: 3.2, APIs: 2, Instructions: 177COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F97152 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F82010 Relevance: 3.0, APIs: 2, Instructions: 34COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F95677 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F814C0 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F977F7 Relevance: 1.6, APIs: 1, Instructions: 142COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F88530 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F956B1 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F820C0 Relevance: 1.5, APIs: 1, Instructions: 12COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B177 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F93400 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B759 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F89A33 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8A2F5 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9ACF0 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8969B Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B6A8 Relevance: 1.7, APIs: 1, Instructions: 199fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9AFB0 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8DDA2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B0D0 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B27D Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F89A27 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F96FE0 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F81BA0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F98576 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FA2E5C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F94D0C Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8F1B8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9F670 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B536 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8C9D2 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9C92E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9A0E6 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F95130 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9499C Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9A9F7 Relevance: 7.7, APIs: 5, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F93400 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B759 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F89A33 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F81C10 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 108libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FA4192 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F98576 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FA2E5C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9442D Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8F1B8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F96DEA Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F877B2 Relevance: 7.5, APIs: 5, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9F670 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9D70E Relevance: 6.3, APIs: 4, Instructions: 333fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F94A33 Relevance: 6.2, APIs: 4, Instructions: 168COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9B536 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F8C9D2 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F9C92E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00FA4450 Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00F81DB0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 78libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.9% |
Dynamic/Decrypted Code Coverage: | 3.2% |
Signature Coverage: | 52.1% |
Total number of Nodes: | 495 |
Total number of Limit Nodes: | 42 |
Graph
Function 00411E10 Relevance: 138.5, APIs: 3, Strings: 75, Instructions: 1970COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437C80 Relevance: 28.9, APIs: 11, Strings: 5, Instructions: 866memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05AD1000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004153E8 Relevance: 18.7, APIs: 1, Strings: 9, Instructions: 1161encryptionCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00408780 Relevance: 7.7, APIs: 5, Instructions: 240threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409BE0 Relevance: 7.6, Strings: 6, Instructions: 115COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00422111 Relevance: 5.7, Strings: 4, Instructions: 664COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00426260 Relevance: 4.0, Strings: 3, Instructions: 299COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043D2F7 Relevance: 3.9, Strings: 3, Instructions: 153COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043FC30 Relevance: 2.9, Strings: 2, Instructions: 376COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043DBCD Relevance: 1.5, APIs: 1, Instructions: 34COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CF30 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CFAA Relevance: 1.3, Strings: 1, Instructions: 90COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00437960 Relevance: .3, Instructions: 297COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042B2E2 Relevance: 1.6, APIs: 1, Instructions: 73COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00436A21 Relevance: 1.6, APIs: 1, Instructions: 58COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043CED0 Relevance: 1.5, APIs: 1, Instructions: 30COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042DEDB Relevance: 1.5, APIs: 1, Instructions: 25COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431782 Relevance: 1.5, APIs: 1, Instructions: 23COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B230 Relevance: 1.5, APIs: 1, Instructions: 18memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C750 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C783 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043B210 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00432280 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 121clipboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00416913 Relevance: 11.6, Strings: 9, Instructions: 377COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041D9B0 Relevance: 9.8, Strings: 7, Instructions: 1060COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409010 Relevance: 9.0, Strings: 7, Instructions: 258COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042A870 Relevance: 9.0, Strings: 7, Instructions: 246COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043BB80 Relevance: 5.7, Strings: 4, Instructions: 666COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414F27 Relevance: 5.4, Strings: 4, Instructions: 387COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438950 Relevance: 4.3, Strings: 3, Instructions: 522COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041A7C6 Relevance: 4.2, Strings: 3, Instructions: 482COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00409690 Relevance: 4.2, Strings: 3, Instructions: 407COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B22A Relevance: 3.9, Strings: 3, Instructions: 130COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040C252 Relevance: 3.8, Strings: 3, Instructions: 95COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00427F32 Relevance: 3.3, APIs: 2, Instructions: 253COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BCF0 Relevance: 3.1, Strings: 2, Instructions: 614COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00424A08 Relevance: 3.1, Strings: 2, Instructions: 608COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AFEA Relevance: 2.7, Strings: 2, Instructions: 200COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042786F Relevance: 2.6, Strings: 2, Instructions: 59COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414280 Relevance: 2.0, Strings: 1, Instructions: 718COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004292F3 Relevance: 1.8, Strings: 1, Instructions: 544COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004219B0 Relevance: 1.7, Strings: 1, Instructions: 493COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428630 Relevance: 1.7, Strings: 1, Instructions: 463COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00414804 Relevance: 1.7, Strings: 1, Instructions: 401COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040DF82 Relevance: 1.5, Strings: 1, Instructions: 249COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00428BF0 Relevance: 1.5, Strings: 1, Instructions: 242COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00438690 Relevance: 1.5, Strings: 1, Instructions: 239COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C8BE Relevance: 1.5, Strings: 1, Instructions: 227COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041C8D5 Relevance: 1.5, Strings: 1, Instructions: 223COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042CF3F Relevance: 1.4, Strings: 1, Instructions: 163COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040CC10 Relevance: 1.3, Strings: 1, Instructions: 36COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00418166 Relevance: .8, Instructions: 789COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00407430 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0043F8A0 Relevance: .3, Instructions: 332COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041BA29 Relevance: .2, Instructions: 235COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 004029E0 Relevance: .2, Instructions: 163COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041ACDA Relevance: .1, Instructions: 84COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B5B9 Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00434E90 Relevance: .1, Instructions: 64COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00429E60 Relevance: .1, Instructions: 63COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0041B497 Relevance: .1, Instructions: 61COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0042AF4D Relevance: .0, Instructions: 43COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A4B5 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0040A706 Relevance: .0, Instructions: 11COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00431475 Relevance: 12.4, APIs: 1, Strings: 6, Instructions: 130memoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|