Windows
Analysis Report
Launcher_x64.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Launcher_x64.exe (PID: 7312 cmdline:
"C:\Users\ user\Deskt op\Launche r_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37) - conhost.exe (PID: 7320 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - Launcher_x64.exe (PID: 7364 cmdline:
"C:\Users\ user\Deskt op\Launche r_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37) - Launcher_x64.exe (PID: 7372 cmdline:
"C:\Users\ user\Deskt op\Launche r_x64.exe" MD5: 741EE77540764D0C3EAB3F6FA16F5F37)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["rabidcowse.shop", "undesirabkel.click", "tirepublicerj.shop", "cloudewahsj.shop", "noisycuttej.shop", "wholersorie.shop", "nearycrepso.shop", "abruptyopsn.shop", "framekgirus.shop"], "Build id": "LPnhqo--swetamubcoyu"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:10.285247+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.424848+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:12.697496+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:16.980147+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:18.395431+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:22.852054+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:26.331153+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.118021+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:10.758421+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.867229+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.896418+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:10.758421+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:11.867229+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:10.285247+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.424848+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:12.697496+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:16.980147+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:18.395431+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:22.852054+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:26.331153+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.118021+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:09.693251+0100 | 2058550 | 1 | Domain Observed Used for C2 Detected | 192.168.2.4 | 56056 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:16.450237+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:26.361006+0100 | 2843864 | 1 | A Network Trojan was detected | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00D7B799 | |
Source: | Code function: | 2_2_00D7B6E8 | |
Source: | Code function: | 2_2_00D7B799 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | TCP traffic: |
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 0_2_00D7EA8E | |
Source: | Code function: | 0_2_00D73440 | |
Source: | Code function: | 0_2_00D6DDE2 | |
Source: | Code function: | 0_2_00D80502 | |
Source: | Code function: | 0_2_00D696DB | |
Source: | Code function: | 2_2_00D7EA8E | |
Source: | Code function: | 2_2_00D73440 | |
Source: | Code function: | 2_2_00D6DDE2 | |
Source: | Code function: | 2_2_00D80502 | |
Source: | Code function: | 2_2_00D696DB |
Source: | Static PE information: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Classification label: |
Source: | Mutant created: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00D69DBD | |
Source: | Code function: | 2_2_00D69DBD | |
Source: | Code function: | 3_3_0301C31A | |
Source: | Code function: | 3_3_0301C31A | |
Source: | Code function: | 3_3_0301C31A | |
Source: | Code function: | 3_3_0301C31A | |
Source: | Code function: | 3_3_0301C31A | |
Source: | Code function: | 3_3_0301CF55 | |
Source: | Code function: | 3_3_0301CF55 | |
Source: | Code function: | 3_3_0301CF55 | |
Source: | Code function: | 3_3_0301CF55 | |
Source: | Code function: | 3_3_0301CF55 | |
Source: | Code function: | 3_3_0301CF65 | |
Source: | Code function: | 3_3_0301CF65 | |
Source: | Code function: | 3_3_0301CF65 | |
Source: | Code function: | 3_3_0301CF65 | |
Source: | Code function: | 3_3_0301CF65 | |
Source: | Code function: | 3_3_0301CF71 | |
Source: | Code function: | 3_3_0301CF71 | |
Source: | Code function: | 3_3_0301CF71 | |
Source: | Code function: | 3_3_0301CF71 | |
Source: | Code function: | 3_3_0301CF71 | |
Source: | Code function: | 3_3_0301E372 | |
Source: | Code function: | 3_3_0301E372 | |
Source: | Code function: | 3_3_0301E372 | |
Source: | Code function: | 3_3_0301E372 | |
Source: | Code function: | 3_3_0301E372 | |
Source: | Code function: | 3_3_0301CAC1 | |
Source: | Code function: | 3_3_0301CAC1 | |
Source: | Code function: | 3_3_0301CAC1 | |
Source: | Code function: | 3_3_0301CAC1 |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_00D7B799 | |
Source: | Code function: | 2_2_00D7B6E8 | |
Source: | Code function: | 2_2_00D7B799 |
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
Source: | Code function: | 0_2_00D69A73 |
Source: | Code function: | 0_2_00D9019E | |
Source: | Code function: | 0_2_00D61BA0 | |
Source: | Code function: | 2_2_00D61BA0 |
Source: | Code function: | 0_2_00D77020 |
Source: | Code function: | 0_2_00D69A73 | |
Source: | Code function: | 0_2_00D69A67 | |
Source: | Code function: | 0_2_00D71A60 | |
Source: | Code function: | 0_2_00D696B3 | |
Source: | Code function: | 2_2_00D69A73 | |
Source: | Code function: | 2_2_00D69A67 | |
Source: | Code function: | 2_2_00D71A60 | |
Source: | Code function: | 2_2_00D696B3 |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Code function: | 0_2_00D9019E |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Process created: | Jump to behavior | ||
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_00D7B0C5 | |
Source: | Code function: | 0_2_00D768FD | |
Source: | Code function: | 0_2_00D7B1B7 | |
Source: | Code function: | 0_2_00D7B110 | |
Source: | Code function: | 0_2_00D7B2BD | |
Source: | Code function: | 0_2_00D7AA37 | |
Source: | Code function: | 0_2_00D763F5 | |
Source: | Code function: | 0_2_00D7AC88 | |
Source: | Code function: | 0_2_00D7AD30 | |
Source: | Code function: | 0_2_00D7AFF0 | |
Source: | Code function: | 0_2_00D7AF83 | |
Source: | Code function: | 2_2_00D7B0C5 | |
Source: | Code function: | 2_2_00D768FD | |
Source: | Code function: | 2_2_00D7B1B7 | |
Source: | Code function: | 2_2_00D7B110 | |
Source: | Code function: | 2_2_00D7B2BD | |
Source: | Code function: | 2_2_00D7AA37 | |
Source: | Code function: | 2_2_00D763F5 | |
Source: | Code function: | 2_2_00D7AC88 | |
Source: | Code function: | 2_2_00D7AD30 | |
Source: | Code function: | 2_2_00D7AFF0 | |
Source: | Code function: | 2_2_00D7AF83 |
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_00D6A335 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 211 Process Injection | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | 1 DLL Side-Loading | 211 Process Injection | LSASS Memory | 1 Query Registry | Remote Desktop Protocol | 41 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 11 Deobfuscate/Decode Files or Information | Security Account Manager | 241 Security Software Discovery | SMB/Windows Admin Shares | Data from Network Shared Drive | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 2 Obfuscated Files or Information | NTDS | 21 Virtualization/Sandbox Evasion | Distributed Component Object Model | Input Capture | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 Software Packing | LSA Secrets | 1 Process Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 DLL Side-Loading | Cached Domain Credentials | 1 Application Window Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | Compile After Delivery | DCSync | 11 File and Directory Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | Indicator Removal from Tools | Proc Filesystem | 33 System Information Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
undesirabkel.click | 188.114.97.3 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | undesirabkel.click | European Union | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582871 |
Start date and time: | 2024-12-31 17:36:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 5m 45s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 8 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Launcher_x64.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@6/0@1/1 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Launcher_x64.exe, PID 7364 because there are no executed function
- Execution Graph export aborted for target Launcher_x64.exe, PID 7372 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: Launcher_x64.exe
Time | Type | Description |
---|---|---|
11:37:10 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
undesirabkel.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | Unknown | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | DBatLoader | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 7.8238522969039845 |
TrID: |
|
File name: | Launcher_x64.exe |
File size: | 825'856 bytes |
MD5: | 741ee77540764d0c3eab3f6fa16f5f37 |
SHA1: | 89db0aca9e9db4cec292b77c9592e8f10626ed11 |
SHA256: | fdfa752ff15ceefd4337704a2f52116dc44d18f7aa2ecb775ad0540dbc3990b2 |
SHA512: | a1a44c2c59d74bf6c5c0d89fc45f8e9e1d4482d6882a8e6d02713dbbb9e346d7bd73289dfb9ddb682c3e91ac7b62153c66ac1799b81c54458a46f9b0f1115c3f |
SSDEEP: | 12288:T3K1Pp+lMeB8fZ3/B+KI5sl+AAdd0tXQjZ3/B+KI5sl+AAdd0tXQJ:bK1PSMZRPB+A+AKdUgFPB+A+AKdUgJ |
TLSH: | 43050152B5D1C073D973267254F4EBBA483EF5201B229ADF1BD80B6E8F306D15A31B29 |
File Content Preview: | MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....sg.................H........................@.......................................@.....................................(.. |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x40a2e0 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NO_ISOLATION, GUARD_CF, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6773E4A4 [Tue Dec 31 12:33:40 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 019ac8c6e24f80fb88de699b6749f599 |
Instruction |
---|
call 00007FC5B4B06D5Ah |
jmp 00007FC5B4B06BBDh |
mov ecx, dword ptr [004307C0h] |
push esi |
push edi |
mov edi, BB40E64Eh |
mov esi, FFFF0000h |
cmp ecx, edi |
je 00007FC5B4B06D56h |
test esi, ecx |
jne 00007FC5B4B06D78h |
call 00007FC5B4B06D81h |
mov ecx, eax |
cmp ecx, edi |
jne 00007FC5B4B06D59h |
mov ecx, BB40E64Fh |
jmp 00007FC5B4B06D60h |
test esi, ecx |
jne 00007FC5B4B06D5Ch |
or eax, 00004711h |
shl eax, 10h |
or ecx, eax |
mov dword ptr [004307C0h], ecx |
not ecx |
pop edi |
mov dword ptr [00430800h], ecx |
pop esi |
ret |
push ebp |
mov ebp, esp |
sub esp, 14h |
lea eax, dword ptr [ebp-0Ch] |
xorps xmm0, xmm0 |
push eax |
movlpd qword ptr [ebp-0Ch], xmm0 |
call dword ptr [0042E8D8h] |
mov eax, dword ptr [ebp-08h] |
xor eax, dword ptr [ebp-0Ch] |
mov dword ptr [ebp-04h], eax |
call dword ptr [0042E894h] |
xor dword ptr [ebp-04h], eax |
call dword ptr [0042E890h] |
xor dword ptr [ebp-04h], eax |
lea eax, dword ptr [ebp-14h] |
push eax |
call dword ptr [0042E920h] |
mov eax, dword ptr [ebp-10h] |
lea ecx, dword ptr [ebp-04h] |
xor eax, dword ptr [ebp-14h] |
xor eax, dword ptr [ebp-04h] |
xor eax, ecx |
leave |
ret |
mov eax, 00004000h |
ret |
push 00431AB8h |
call dword ptr [0042E8F8h] |
ret |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
int3 |
mov al, 01h |
ret |
push 00030000h |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2e6c4 | 0x28 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x34000 | 0xe8 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x35000 | 0x1b90 | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2a9a8 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x26e40 | 0xc0 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2e834 | 0x148 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x247da | 0x24800 | ba0610d1e4ecb6f5f64959d9eb5b455a | False | 0.5549951840753424 | data | 6.559506263512015 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x26000 | 0x9eb4 | 0xa000 | 53eba87ddc7d2455b0ac2836680b1660 | False | 0.428271484375 | DOS executable (COM) | 4.9181666163124085 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x30000 | 0x2280 | 0x1600 | 112d0c9e43893ae5b7f96d23807996ac | False | 0.39506392045454547 | data | 4.581141173428789 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.tls | 0x33000 | 0x9 | 0x200 | 1f354d76203061bfdd5a53dae48d5435 | False | 0.033203125 | data | 0.020393135236084953 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x34000 | 0xe8 | 0x200 | 03d6bf5d1e31277fc8fb90374111d794 | False | 0.306640625 | data | 2.344915704357875 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x35000 | 0x1b90 | 0x1c00 | 3080b38ba0e27b64b3ab5ca0f93c1c7c | False | 0.7785993303571429 | data | 6.532705218372571 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
.BSS | 0x37000 | 0x4ba00 | 0x4ba00 | 250dd5c248e14428968453ebc45126bd | False | 1.0003260588842975 | data | 7.999337203877817 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.BSS | 0x83000 | 0x4ba00 | 0x4ba00 | 250dd5c248e14428968453ebc45126bd | False | 1.0003260588842975 | data | 7.999337203877817 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x34060 | 0x87 | XML 1.0 document, ASCII text | English | United States | 0.8222222222222222 |
DLL | Import |
---|---|
KERNEL32.dll | AcquireSRWLockExclusive, CloseHandle, CompareStringW, CreateFileW, DecodePointer, DeleteCriticalSection, EncodePointer, EnterCriticalSection, EnumSystemLocalesW, ExitProcess, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetConsoleMode, GetConsoleOutputCP, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentStringsW, GetFileSize, GetFileSizeEx, GetFileType, GetLastError, GetLocaleInfoW, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemTimeAsFileTime, GetUserDefaultLCID, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeCriticalSectionEx, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, IsValidLocale, LCMapStringEx, LCMapStringW, LeaveCriticalSection, LoadLibraryExW, MultiByteToWideChar, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, ReleaseSRWLockExclusive, RtlUnwind, SetEnvironmentVariableW, SetFilePointerEx, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SleepConditionVariableSRW, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnhandledExceptionFilter, WakeAllConditionVariable, WideCharToMultiByte, WriteConsoleW, WriteFile |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:37:09.693251+0100 | 2058550 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) | 1 | 192.168.2.4 | 56056 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:37:10.285247+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:10.285247+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:10.758421+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:10.758421+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.424848+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.424848+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.867229+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:11.867229+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:12.697496+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:12.697496+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:16.450237+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:16.980147+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:16.980147+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:18.395431+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:18.395431+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:22.852054+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:22.852054+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:26.331153+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:26.331153+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:26.361006+0100 | 2843864 | ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 | 1 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.118021+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.118021+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:37:29.896418+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:37:09.719739914 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:09.719770908 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:09.719835043 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:09.723352909 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:09.723376036 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.285085917 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.285247087 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.293884039 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.293895006 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.294135094 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.337440968 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.350260973 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.350281954 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.350351095 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.758411884 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.758531094 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.758753061 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.788531065 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.788573027 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.961338997 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.961388111 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:10.961469889 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.964643955 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:10.964657068 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.424774885 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.424848080 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.426978111 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.426989079 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.427248955 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.429259062 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.429301977 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.429331064 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867115021 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867156029 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867177963 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867217064 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867213964 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.867279053 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867341042 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.867734909 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867760897 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867794037 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.867810965 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.867866993 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.868141890 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.873902082 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.873927116 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.873955011 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.873970032 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.874030113 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.959969997 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960028887 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960071087 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960098982 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.960138083 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960161924 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960313082 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.960313082 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.960879087 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.960916996 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:11.960942984 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:11.960958004 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.230325937 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.230370045 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.230446100 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.230741024 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.230756998 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.697410107 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.697495937 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.698777914 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.698793888 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.699049950 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.700212955 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.700337887 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.700368881 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:12.700437069 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:12.700444937 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.450150967 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.450314045 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.450378895 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:16.450479031 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:16.450499058 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.514784098 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:16.514827967 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.514909983 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:16.515153885 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:16.515166998 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.980068922 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:16.980146885 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.005909920 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.005923033 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.006182909 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.025032997 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.025146008 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.025183916 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.748492956 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.748568058 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.748689890 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.749104977 CET | 49733 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.749121904 CET | 443 | 49733 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.937923908 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.937969923 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:17.938046932 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.938347101 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:17.938359022 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:18.395370007 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:18.395431042 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:18.396610975 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:18.396625042 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:18.396868944 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:18.397978067 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:18.398125887 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:18.398161888 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:18.398217916 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:18.398230076 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:21.822658062 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:21.822751999 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:21.822835922 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:21.822974920 CET | 49734 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:21.822995901 CET | 443 | 49734 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.396245003 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.396292925 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.396414042 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.396615028 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.396629095 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.851968050 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.852054119 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.854702950 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.854712009 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.854908943 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:22.861881971 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.862201929 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:22.862206936 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:25.379285097 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:25.379384995 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:25.379426956 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:25.379528999 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:25.379545927 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:25.853744984 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:25.853792906 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:25.853851080 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:25.854326010 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:25.854340076 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.330873966 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.331152916 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.332082987 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.332091093 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.332324982 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.360295057 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.360295057 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.360341072 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.360517979 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.360547066 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.360661030 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.360693932 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.360811949 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.360841990 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.360974073 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361004114 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.361150980 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361175060 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.361182928 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361192942 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.361288071 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361319065 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.361336946 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361535072 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.361562014 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.370270014 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.370434999 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.370451927 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.370470047 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.370497942 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.370754004 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:26.370773077 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:26.370788097 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:28.602416992 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:28.602509022 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:28.602648973 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:28.602736950 CET | 49736 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:28.602756977 CET | 443 | 49736 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:28.632592916 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:28.632652044 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:28.632723093 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:28.633018970 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:28.633034945 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.117961884 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.118021011 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.119477034 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.119487047 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.119702101 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.127862930 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.127890110 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.128009081 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896421909 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896491051 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896523952 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896565914 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.896578074 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896589041 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.896617889 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.896986961 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897034883 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.897053003 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897164106 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897202015 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897202015 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.897211075 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897253990 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.897841930 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.897984982 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.898030996 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.898041010 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.898052931 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.898091078 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.898199081 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.898221016 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:29.898237944 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Dec 31, 2024 17:37:29.898243904 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Dec 31, 2024 17:37:53.470264912 CET | 65531 | 53 | 192.168.2.4 | 162.159.36.2 |
Dec 31, 2024 17:37:53.475059032 CET | 53 | 65531 | 162.159.36.2 | 192.168.2.4 |
Dec 31, 2024 17:37:53.475128889 CET | 65531 | 53 | 192.168.2.4 | 162.159.36.2 |
Dec 31, 2024 17:37:53.479945898 CET | 53 | 65531 | 162.159.36.2 | 192.168.2.4 |
Dec 31, 2024 17:37:53.948426962 CET | 65531 | 53 | 192.168.2.4 | 162.159.36.2 |
Dec 31, 2024 17:37:53.954137087 CET | 53 | 65531 | 162.159.36.2 | 192.168.2.4 |
Dec 31, 2024 17:37:53.954195976 CET | 65531 | 53 | 192.168.2.4 | 162.159.36.2 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:37:09.693250895 CET | 56056 | 53 | 192.168.2.4 | 1.1.1.1 |
Dec 31, 2024 17:37:09.713295937 CET | 53 | 56056 | 1.1.1.1 | 192.168.2.4 |
Dec 31, 2024 17:37:53.469634056 CET | 53 | 64016 | 162.159.36.2 | 192.168.2.4 |
Dec 31, 2024 17:37:53.986955881 CET | 53 | 57352 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:37:09.693250895 CET | 192.168.2.4 | 1.1.1.1 | 0x7570 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:37:09.713295937 CET | 1.1.1.1 | 192.168.2.4 | 0x7570 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:37:09.713295937 CET | 1.1.1.1 | 192.168.2.4 | 0x7570 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:10 UTC | 265 | OUT | |
2024-12-31 16:37:10 UTC | 8 | OUT | |
2024-12-31 16:37:10 UTC | 1129 | IN | |
2024-12-31 16:37:10 UTC | 7 | IN | |
2024-12-31 16:37:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:11 UTC | 266 | OUT | |
2024-12-31 16:37:11 UTC | 54 | OUT | |
2024-12-31 16:37:11 UTC | 1133 | IN | |
2024-12-31 16:37:11 UTC | 236 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN | |
2024-12-31 16:37:11 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:12 UTC | 275 | OUT | |
2024-12-31 16:37:12 UTC | 15331 | OUT | |
2024-12-31 16:37:12 UTC | 2785 | OUT | |
2024-12-31 16:37:16 UTC | 1136 | IN | |
2024-12-31 16:37:16 UTC | 20 | IN | |
2024-12-31 16:37:16 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49733 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:17 UTC | 284 | OUT | |
2024-12-31 16:37:17 UTC | 8797 | OUT | |
2024-12-31 16:37:17 UTC | 1138 | IN | |
2024-12-31 16:37:17 UTC | 20 | IN | |
2024-12-31 16:37:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49734 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:18 UTC | 277 | OUT | |
2024-12-31 16:37:18 UTC | 15331 | OUT | |
2024-12-31 16:37:18 UTC | 5071 | OUT | |
2024-12-31 16:37:21 UTC | 1138 | IN | |
2024-12-31 16:37:21 UTC | 20 | IN | |
2024-12-31 16:37:21 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:22 UTC | 284 | OUT | |
2024-12-31 16:37:22 UTC | 1270 | OUT | |
2024-12-31 16:37:25 UTC | 1127 | IN | |
2024-12-31 16:37:25 UTC | 20 | IN | |
2024-12-31 16:37:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49736 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:26 UTC | 276 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:26 UTC | 15331 | OUT | |
2024-12-31 16:37:28 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | 7372 | C:\Users\user\Desktop\Launcher_x64.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:37:29 UTC | 266 | OUT | |
2024-12-31 16:37:29 UTC | 89 | OUT | |
2024-12-31 16:37:29 UTC | 1131 | IN | |
2024-12-31 16:37:29 UTC | 238 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN | |
2024-12-31 16:37:29 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:37:08 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Launcher_x64.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd60000 |
File size: | 825'856 bytes |
MD5 hash: | 741EE77540764D0C3EAB3F6FA16F5F37 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:37:08 |
Start date: | 31/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff7699e0000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Target ID: | 2 |
Start time: | 11:37:08 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Launcher_x64.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0xd60000 |
File size: | 825'856 bytes |
MD5 hash: | 741EE77540764D0C3EAB3F6FA16F5F37 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 3 |
Start time: | 11:37:08 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\Launcher_x64.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xd60000 |
File size: | 825'856 bytes |
MD5 hash: | 741EE77540764D0C3EAB3F6FA16F5F37 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | false |
Execution Graph
Execution Coverage: | 7.3% |
Dynamic/Decrypted Code Coverage: | 0.4% |
Signature Coverage: | 1.1% |
Total number of Nodes: | 2000 |
Total number of Limit Nodes: | 37 |
Graph
Function 00D9019E Relevance: 44.0, APIs: 11, Strings: 14, Instructions: 295threadinjectionmemoryCOMMON
Control-flow Graph
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61C10 Relevance: 14.1, APIs: 7, Strings: 1, Instructions: 108libraryfileloaderCOMMON
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D76642 Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 74COMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D620C0 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 33libraryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61DB0 Relevance: 7.1, APIs: 2, Strings: 2, Instructions: 78librarymemoryloaderCOMMON
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D77192 Relevance: 3.1, APIs: 2, Instructions: 65COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D62010 Relevance: 3.0, APIs: 2, Instructions: 34COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D756B7 Relevance: 3.0, APIs: 2, Instructions: 22memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D614C0 Relevance: 1.8, APIs: 1, Instructions: 308COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D68570 Relevance: 1.6, APIs: 1, Instructions: 116COMMON
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D756F1 Relevance: 1.5, APIs: 1, Instructions: 32memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B1B7 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 85COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D73440 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B799 Relevance: 6.2, APIs: 4, Instructions: 206fileCOMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D69A73 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6A335 Relevance: 6.0, APIs: 4, Instructions: 25timethreadCOMMONLIBRARYCODE
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7AD30 Relevance: 4.7, APIs: 3, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D696DB Relevance: 1.7, APIs: 1, Instructions: 242COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7AFF0 Relevance: 1.6, APIs: 1, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6DDE2 Relevance: 1.6, Strings: 1, Instructions: 318COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B110 Relevance: 1.6, APIs: 1, Instructions: 63COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B2BD Relevance: 1.5, APIs: 1, Instructions: 48COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D69A67 Relevance: 1.5, APIs: 1, Instructions: 3COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D77020 Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61BA0 Relevance: .0, Instructions: 15COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D841D2 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D785B6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D82E9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D74D4C Relevance: 9.1, APIs: 2, Strings: 3, Instructions: 301COMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6F1F8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D76E2A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7F6B0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B576 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6CA12 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7C96E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7A126 Relevance: 5.4, APIs: 2, Strings: 1, Instructions: 191COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D75170 Relevance: 5.4, APIs: 1, Strings: 2, Instructions: 122COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D749DC Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 97COMMONLIBRARYCODE
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7AA37 Relevance: 7.7, APIs: 5, Instructions: 182COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D73440 Relevance: 6.5, APIs: 4, Instructions: 455COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B799 Relevance: 6.2, APIs: 4, Instructions: 205COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D69A73 Relevance: 6.1, APIs: 4, Instructions: 70COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61C10 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 108libraryloaderCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D841D2 Relevance: 12.2, APIs: 8, Instructions: 248COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D785B6 Relevance: 10.8, APIs: 7, Instructions: 329COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D82E9C Relevance: 9.3, APIs: 6, Instructions: 292COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7446D Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6F1F8 Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 42libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D76E2A Relevance: 7.7, APIs: 5, Instructions: 197COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D677F2 Relevance: 7.5, APIs: 5, Instructions: 44COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D620C0 Relevance: 7.0, APIs: 2, Strings: 2, Instructions: 33libraryloaderCOMMON
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7F6B0 Relevance: 7.0, APIs: 3, Strings: 1, Instructions: 27libraryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7D74E Relevance: 6.3, APIs: 4, Instructions: 333fileCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D74A73 Relevance: 6.2, APIs: 4, Instructions: 168COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7B576 Relevance: 6.1, APIs: 4, Instructions: 82COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D6CA12 Relevance: 6.1, APIs: 4, Instructions: 79COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D7C96E Relevance: 6.1, APIs: 4, Instructions: 74COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D84490 Relevance: 6.0, APIs: 4, Instructions: 29COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00D61DB0 Relevance: 5.3, APIs: 1, Strings: 2, Instructions: 78libraryloaderCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|