Windows
Analysis Report
PASS-1234.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- PASS-1234.exe (PID: 1916 cmdline:
"C:\Users\ user\Deskt op\PASS-12 34.exe" MD5: CF15F3E3576D512CF0696D4035212451) - conhost.exe (PID: 4368 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - aspnet_regiis.exe (PID: 4512 cmdline:
"C:\Window s\Microsof t.NET\Fram ework\v4.0 .30319\asp net_regiis .exe" MD5: 5D1D74198D75640E889F0A577BBF31FC) - WerFault.exe (PID: 4776 cmdline:
C:\Windows \SysWOW64\ WerFault.e xe -u -p 1 916 -s 122 4 MD5: C31336C1EFC2CCB44B4326EA793040F2)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["noisycuttej.shop", "nearycrepso.shop", "framekgirus.shop", "abruptyopsn.shop", "tirepublicerj.shop", "rabidcowse.shop", "wholersorie.shop", "cloudewahsj.shop", "undesirabkel.click"], "Build id": "LPnhqo--wcyjskajenao"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AntiVM_3 | Yara detected AntiVM_3 | Joe Security | ||
Click to see the 5 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:14.786997+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:39:46.812877+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.343881+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:09.507842+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:10.734503+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49989 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:11.944071+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49990 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:13.518980+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49991 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:16.683127+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49992 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:18.160408+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49993 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.336200+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:46.220798+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:40:07.873836+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.799774+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.794131+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:46.220798+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:40:07.873836+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:40:08.799774+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:46.812877+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.343881+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:09.507842+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:10.734503+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49989 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:11.944071+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49990 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:13.518980+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49991 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:16.683127+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49992 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:18.160408+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49993 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.336200+0100 | 2058599 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:14.786997+0100 | 2058551 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:46.331181+0100 | 2058598 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 57016 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:46.244581+0100 | 2058616 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 57616 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:14.247349+0100 | 2058550 | 1 | Domain Observed Used for C2 Detected | 192.168.2.6 | 50384 | 1.1.1.1 | 53 | UDP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:40:10.010366+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Code function: | 0_2_6D393562 |
Source: | Code function: | 0_2_00BB6860 | |
Source: | Code function: | 0_2_00BB6860 | |
Source: | Code function: | 0_2_00BED110 | |
Source: | Code function: | 0_2_00BB3A90 | |
Source: | Code function: | 0_2_00BB83F0 | |
Source: | Code function: | 0_2_00BB83F0 | |
Source: | Code function: | 0_2_00BC5E50 | |
Source: | Code function: | 3_2_0317AB30 | |
Source: | Code function: | 3_2_03196B60 | |
Source: | Code function: | 3_2_03196B60 | |
Source: | Code function: | 3_2_031AFA20 | |
Source: | Code function: | 3_2_031AD962 | |
Source: | Code function: | 3_2_0317B9B5 | |
Source: | Code function: | 3_2_0317C9D1 | |
Source: | Code function: | 3_2_031AE1E1 | |
Source: | Code function: | 3_2_031AE043 | |
Source: | Code function: | 3_2_0317DF42 | |
Source: | Code function: | 3_2_0319C601 | |
Source: | Code function: | 3_2_0319D5B5 | |
Source: | Code function: | 3_2_031ABDD0 | |
Source: | Code function: | 3_2_031ABDD0 | |
Source: | Code function: | 3_2_0317CDCA | |
Source: | Code function: | 3_2_0317CDCA | |
Source: | Code function: | 3_2_031A5B00 | |
Source: | Code function: | 3_2_03172B90 | |
Source: | Code function: | 3_2_0317DBE5 | |
Source: | Code function: | 3_2_031AC210 | |
Source: | Code function: | 3_2_031AD25E | |
Source: | Code function: | 3_2_0319AAA0 | |
Source: | Code function: | 3_2_0318C11B | |
Source: | Code function: | 3_2_03199129 | |
Source: | Code function: | 3_2_03175960 | |
Source: | Code function: | 3_2_03175960 | |
Source: | Code function: | 3_2_031889FD | |
Source: | Code function: | 3_2_031909F0 | |
Source: | Code function: | 3_2_0318B83D | |
Source: | Code function: | 3_2_031AC020 | |
Source: | Code function: | 3_2_0318F040 | |
Source: | Code function: | 3_2_03199862 | |
Source: | Code function: | 3_2_03199862 | |
Source: | Code function: | 3_2_031B00B0 | |
Source: | Code function: | 3_2_031870CA | |
Source: | Code function: | 3_2_031870CA | |
Source: | Code function: | 3_2_0318D0EC | |
Source: | Code function: | 3_2_03185F48 | |
Source: | Code function: | 3_2_03179770 | |
Source: | Code function: | 3_2_03179770 | |
Source: | Code function: | 3_2_03179770 | |
Source: | Code function: | 3_2_0319AFD0 | |
Source: | Code function: | 3_2_031957D0 | |
Source: | Code function: | 3_2_031957D0 | |
Source: | Code function: | 3_2_0317AFC0 | |
Source: | Code function: | 3_2_03193FF2 | |
Source: | Code function: | 3_2_0317A7EC | |
Source: | Code function: | 3_2_0319C607 | |
Source: | Code function: | 3_2_0318E630 | |
Source: | Code function: | 3_2_03197E69 | |
Source: | Code function: | 3_2_03199E60 | |
Source: | Code function: | 3_2_0318CE98 | |
Source: | Code function: | 3_2_0318CEB5 | |
Source: | Code function: | 3_2_0319BEA2 | |
Source: | Code function: | 3_2_0318D50B | |
Source: | Code function: | 3_2_031AFD30 | |
Source: | Code function: | 3_2_031A9520 | |
Source: | Code function: | 3_2_031A9520 | |
Source: | Code function: | 3_2_031A9520 | |
Source: | Code function: | 3_2_031AC540 | |
Source: | Code function: | 3_2_0318958C | |
Source: | Code function: | 3_2_03198DA0 | |
Source: | Code function: | 3_2_03198DA0 | |
Source: | Code function: | 3_2_0319E5EF | |
Source: | Code function: | 3_2_03199129 | |
Source: | Code function: | 3_2_031964D7 | |
Source: | Code function: | 3_2_031774F0 | |
Source: | Code function: | 3_2_031774F0 | |
Source: | Code function: | 3_2_031AE4E1 |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Code function: | 3_2_031A2FF0 |
Source: | Code function: | 3_2_05711000 |
Source: | Code function: | 3_2_031A2FF0 |
Source: | Code function: | 3_2_031A41B0 |
System Summary |
---|
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Code function: | 0_2_6D387E40 | |
Source: | Code function: | 0_2_6D3863E0 |
Source: | Code function: | 0_2_00BB4820 | |
Source: | Code function: | 0_2_00BB6860 | |
Source: | Code function: | 0_2_00BB7170 | |
Source: | Code function: | 0_2_00BC5150 | |
Source: | Code function: | 0_2_00BCE940 | |
Source: | Code function: | 0_2_00BB83F0 | |
Source: | Code function: | 0_2_00B99B3A | |
Source: | Code function: | 0_2_00BCF330 | |
Source: | Code function: | 0_2_00BB5B60 | |
Source: | Code function: | 0_2_00BE9490 | |
Source: | Code function: | 0_2_00BCEC10 | |
Source: | Code function: | 0_2_00B99C68 | |
Source: | Code function: | 0_2_00B985BA | |
Source: | Code function: | 0_2_00BD0590 | |
Source: | Code function: | 0_2_00BCBDC0 | |
Source: | Code function: | 0_2_00BE8E10 | |
Source: | Code function: | 0_2_00BB3E00 | |
Source: | Code function: | 0_2_00BB7600 | |
Source: | Code function: | 0_2_00B97668 | |
Source: | Code function: | 0_2_00B9D7F9 | |
Source: | Code function: | 0_2_00BE97E0 | |
Source: | Code function: | 0_2_6D387E40 | |
Source: | Code function: | 0_2_6D381930 | |
Source: | Code function: | 0_2_6D3863E0 | |
Source: | Code function: | 0_2_6D399531 | |
Source: | Code function: | 0_2_6D381000 | |
Source: | Code function: | 0_2_6D38EB40 | |
Source: | Code function: | 0_2_6D3843A0 | |
Source: | Code function: | 0_2_6D387220 | |
Source: | Code function: | 0_2_00BEB120 | |
Source: | Code function: | 3_2_0317AB30 | |
Source: | Code function: | 3_2_0317D37F | |
Source: | Code function: | 3_2_03196B60 | |
Source: | Code function: | 3_2_031913D0 | |
Source: | Code function: | 3_2_031AFA20 | |
Source: | Code function: | 3_2_03180997 | |
Source: | Code function: | 3_2_0317D9CE | |
Source: | Code function: | 3_2_031A88E0 | |
Source: | Code function: | 3_2_03183756 | |
Source: | Code function: | 3_2_031927AF | |
Source: | Code function: | 3_2_0319CE11 | |
Source: | Code function: | 3_2_03192E22 | |
Source: | Code function: | 3_2_031786D0 | |
Source: | Code function: | 3_2_03193450 | |
Source: | Code function: | 3_2_031B0440 | |
Source: | Code function: | 3_2_0319C31F | |
Source: | Code function: | 3_2_03189B00 | |
Source: | Code function: | 3_2_03186322 | |
Source: | Code function: | 3_2_0318ABC0 | |
Source: | Code function: | 3_2_0319F23E | |
Source: | Code function: | 3_2_031AD25E | |
Source: | Code function: | 3_2_03184250 | |
Source: | Code function: | 3_2_03178A40 | |
Source: | Code function: | 3_2_0318DA40 | |
Source: | Code function: | 3_2_03195A7F | |
Source: | Code function: | 3_2_03176270 | |
Source: | Code function: | 3_2_031A9260 | |
Source: | Code function: | 3_2_031AF260 | |
Source: | Code function: | 3_2_03193A90 | |
Source: | Code function: | 3_2_031792B0 | |
Source: | Code function: | 3_2_031742D0 | |
Source: | Code function: | 3_2_031A12C0 | |
Source: | Code function: | 3_2_0319C2C6 | |
Source: | Code function: | 3_2_031AF110 | |
Source: | Code function: | 3_2_03196130 | |
Source: | Code function: | 3_2_03199129 | |
Source: | Code function: | 3_2_03173920 | |
Source: | Code function: | 3_2_0318E120 | |
Source: | Code function: | 3_2_0319D150 | |
Source: | Code function: | 3_2_03175960 | |
Source: | Code function: | 3_2_0319219F | |
Source: | Code function: | 3_2_031AF1C0 | |
Source: | Code function: | 3_2_031889FD | |
Source: | Code function: | 3_2_031909F0 | |
Source: | Code function: | 3_2_0319D819 | |
Source: | Code function: | 3_2_03192070 | |
Source: | Code function: | 3_2_03199862 | |
Source: | Code function: | 3_2_03186322 | |
Source: | Code function: | 3_2_031B00B0 | |
Source: | Code function: | 3_2_031988D4 | |
Source: | Code function: | 3_2_031870CA | |
Source: | Code function: | 3_2_031A68FE | |
Source: | Code function: | 3_2_031AE8F6 | |
Source: | Code function: | 3_2_0319A0E0 | |
Source: | Code function: | 3_2_03196F10 | |
Source: | Code function: | 3_2_031A7F10 | |
Source: | Code function: | 3_2_03172F00 | |
Source: | Code function: | 3_2_03176700 | |
Source: | Code function: | 3_2_03196F30 | |
Source: | Code function: | 3_2_03179770 | |
Source: | Code function: | 3_2_03187F96 | |
Source: | Code function: | 3_2_0319C7B2 | |
Source: | Code function: | 3_2_031AEFA0 | |
Source: | Code function: | 3_2_0319AFD0 | |
Source: | Code function: | 3_2_031957D0 | |
Source: | Code function: | 3_2_0317AFC0 | |
Source: | Code function: | 3_2_03193FF2 | |
Source: | Code function: | 3_2_031A07EF | |
Source: | Code function: | 3_2_03178FE0 | |
Source: | Code function: | 3_2_0318E630 | |
Source: | Code function: | 3_2_0317DE26 | |
Source: | Code function: | 3_2_03197E69 | |
Source: | Code function: | 3_2_0318F690 | |
Source: | Code function: | 3_2_03175EB0 | |
Source: | Code function: | 3_2_031AEEB0 | |
Source: | Code function: | 3_2_0319C6D9 | |
Source: | Code function: | 3_2_0318AEC0 | |
Source: | Code function: | 3_2_0318C6F8 | |
Source: | Code function: | 3_2_0318DD10 | |
Source: | Code function: | 3_2_031AFD30 | |
Source: | Code function: | 3_2_031A9520 | |
Source: | Code function: | 3_2_03193D50 | |
Source: | Code function: | 3_2_031AC540 | |
Source: | Code function: | 3_2_031A2D70 | |
Source: | Code function: | 3_2_031A8590 | |
Source: | Code function: | 3_2_0317C586 | |
Source: | Code function: | 3_2_03198DA0 | |
Source: | Code function: | 3_2_0318BDF0 | |
Source: | Code function: | 3_2_0318E430 | |
Source: | Code function: | 3_2_03186C2F | |
Source: | Code function: | 3_2_031AD45C | |
Source: | Code function: | 3_2_03199129 | |
Source: | Code function: | 3_2_031A9C57 | |
Source: | Code function: | 3_2_031A6455 | |
Source: | Code function: | 3_2_03174C60 | |
Source: | Code function: | 3_2_031964D7 | |
Source: | Code function: | 3_2_031774F0 |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: | 3_2_031A88E0 |
Source: | File created: | Jump to behavior |
Source: | Mutant created: | ||
Source: | Mutant created: | ||
Source: | Mutant created: |
Source: | File created: | Jump to behavior |
Source: | Static file information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File read: | Jump to behavior |
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | |||
Source: | Process created: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | File opened: | Jump to behavior |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: | ||
Source: | Binary string: |
Data Obfuscation |
---|
Source: | Unpacked PE file: |
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_2_00B990B7 | |
Source: | Code function: | 0_2_00B960EF | |
Source: | Code function: | 0_2_00B960EF | |
Source: | Code function: | 0_2_00B971D6 | |
Source: | Code function: | 0_2_00BA11A9 | |
Source: | Code function: | 0_2_00B9C9CF | |
Source: | Code function: | 0_2_00B961EC | |
Source: | Code function: | 0_2_00B961EC | |
Source: | Code function: | 0_2_00B9C9CF | |
Source: | Code function: | 0_2_00B960EF | |
Source: | Code function: | 0_2_00B92220 | |
Source: | Code function: | 0_2_00B98254 | |
Source: | Code function: | 0_2_00BA1A85 | |
Source: | Code function: | 0_2_00B961EC | |
Source: | Code function: | 0_2_00B94A97 | |
Source: | Code function: | 0_2_00BEFD62 | |
Source: | Code function: | 0_2_00B96EBF | |
Source: | Code function: | 0_2_00BA06EB | |
Source: | Code function: | 0_2_00B937F7 | |
Source: | Code function: | 3_2_031AC17E | |
Source: | Code function: | 3_2_031AEE62 |
Source: | Static PE information: |
Source: | File created: | Jump to dropped file |
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior | ||
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | File source: |
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior | ||
Source: | Memory allocated: | Jump to behavior |
Source: | Window / User API: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior | ||
Source: | Thread sleep count: | Jump to behavior |
Source: | WMI Queries: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | 0_2_6D393562 |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | API call chain: | graph_3-13672 |
Source: | Process information queried: | Jump to behavior |
Source: | Process queried: | Jump to behavior | ||
Source: | Process queried: | Jump to behavior |
Source: | Code function: | 3_2_031AD810 |
Source: | Code function: | 0_2_6D39051A |
Source: | Code function: | 0_2_6D391CA5 | |
Source: | Code function: | 0_2_6D392E79 |
Source: | Code function: | 0_2_6D394A8C |
Source: | Code function: | 0_2_6D39051A | |
Source: | Code function: | 0_2_6D392EAA | |
Source: | Code function: | 0_2_6D390041 |
Source: | Memory allocated: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | Memory allocated: | Jump to behavior |
Source: | Memory written: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior | ||
Source: | Memory written: | Jump to behavior |
Source: | Process created: | Jump to behavior |
Source: | Code function: | 0_2_6D3906E8 |
Source: | Queries volume information: | Jump to behavior | ||
Source: | Queries volume information: | Jump to behavior |
Source: | Code function: | 0_2_6D390163 |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 1 Disable or Modify Tools | 2 OS Credential Dumping | 1 System Time Discovery | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 2 Command and Scripting Interpreter | Boot or Logon Initialization Scripts | 311 Process Injection | 11 Deobfuscate/Decode Files or Information | LSASS Memory | 1 File and Directory Discovery | Remote Desktop Protocol | 4 Data from Local System | 2 Non-Application Layer Protocol | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | 1 PowerShell | Logon Script (Windows) | Logon Script (Windows) | 4 Obfuscated Files or Information | Security Account Manager | 33 System Information Discovery | SMB/Windows Admin Shares | 1 Screen Capture | 113 Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 12 Software Packing | NTDS | 251 Security Software Discovery | Distributed Component Object Model | 3 Clipboard Data | Protocol Impersonation | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | 1 DLL Side-Loading | LSA Secrets | 23 Virtualization/Sandbox Evasion | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | 1 Masquerading | Cached Domain Credentials | 1 Process Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
DNS | Web Services | External Remote Services | Systemd Timers | Startup Items | Startup Items | 23 Virtualization/Sandbox Evasion | DCSync | 1 Application Window Discovery | Windows Remote Management | Web Portal Capture | Commonly Used Port | Exfiltration Over C2 Channel | Inhibit System Recovery |
Network Trust Dependencies | Serverless | Drive-by Compromise | Container Orchestration Job | Scheduled Task/Job | Scheduled Task/Job | 311 Process Injection | Proc Filesystem | System Owner/User Discovery | Cloud Services | Credential API Hooking | Application Layer Protocol | Exfiltration Over Alternative Protocol | Defacement |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Joe Sandbox ML |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
undesirabkel.click | 188.114.97.3 | true | false | high | |
abruptyopsn.shop | 104.21.96.1 | true | true | unknown | |
nearycrepso.shop | unknown | unknown | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
true |
| unknown | |
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | undesirabkel.click | European Union | 13335 | CLOUDFLARENETUS | false | |
104.21.96.1 | abruptyopsn.shop | United States | 13335 | CLOUDFLARENETUS | true |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1582873 |
Start date and time: | 2024-12-31 17:38:18 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 6m 9s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 11 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | PASS-1234.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@5/7@3/2 |
EGA Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
- Excluded IPs from analysis (whitelisted): 20.189.173.20, 40.126.32.140, 13.107.246.45, 52.149.20.212
- Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtProtectVirtualMemory calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: PASS-1234.exe
Time | Type | Description |
---|---|---|
11:39:17 | API Interceptor | |
11:39:45 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
| ||
104.21.96.1 | Get hash | malicious | CMSBrute | Browse |
| |
Get hash | malicious | FormBook | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
abruptyopsn.shop | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
undesirabkel.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
| ||
Get hash | malicious | Vidar | Browse |
| ||
Get hash | malicious | Titanium Proxy, PureLog Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC, Amadey, LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_PASS-1234.exe_e021ab1d3b8f5f284669294561b364c83af9d6fb_861bfbec_73b98097-6c03-4186-9005-e2bd03b99b7e\Report.wer
Download File
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 65536 |
Entropy (8bit): | 0.989892371139277 |
Encrypted: | false |
SSDEEP: | 192:M+sFg6JTekd0BU/iaG1CzuiFL9Z24IO8Nn:0Fg6JT/eBU/iapzuiFpY4IO8N |
MD5: | 6596F6F67AB8F64BD3048619A510F631 |
SHA1: | FFE65C2E3B8185F275BCB8B5A6173CDF74CDB138 |
SHA-256: | 60DF695631AB6A773E136AB016AC1EC82532A862FCF227137B63E13237DBC683 |
SHA-512: | 0A5AED60834DC1D5696639CE697E18947B399068DC794DF0A268F9198A814E2326D609B397C912B921BB1D7DD8C4F22635DFA94EB82BCF322F1741AB8CD1E981 |
Malicious: | true |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 196696 |
Entropy (8bit): | 3.384647930402179 |
Encrypted: | false |
SSDEEP: | 1536:Dt4zdl3jgtKcW3nxUCDKX9rpN4uE2aOayLTgGsokODgkFw+t:54n2WXBKtD4uEqayLTg7kmQ |
MD5: | 35D1521778DAF1E68C9CFF796150879F |
SHA1: | F809429AFEB044D1AC44E3CF65CC9ACA2FDCB85B |
SHA-256: | 5B878B118B50C67B4CE7C75AABBAC4EA5E673D4AB9657DD5189A14C2B36E2859 |
SHA-512: | 00CA965E8E66B3D029F375C5C30B6052390978DDA36547FB3DF1A92F952343E2EE0F72537DE82C6F33211ED216839900C5771F4F2518F0D99B94007CECF19DC9 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 8408 |
Entropy (8bit): | 3.7068200955563277 |
Encrypted: | false |
SSDEEP: | 192:R6l7wVeJut69b6Y2DpSUkTcpyugmfZ2YiprQ89bvTsfnLlm:R6lXJ06B6YkSUJpyugmfEY6v4fk |
MD5: | FACC822EACD46C831D06C8E1A338170B |
SHA1: | 3A9142F0179FA46C950E62DFF9C828EE4FCA27EB |
SHA-256: | 5641997628A584813114FD406BA2FA184969387CEDFED26DD213AAB8FAD9E080 |
SHA-512: | 70A5E6C56F56A93DA6D4243761E6FF1217873F858584D4341F62C845818D680E9015381E29B6C8707B14C690D7A3DD6EF3D806FE6A7023138EF391208EE07F9E |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 4776 |
Entropy (8bit): | 4.528568462195372 |
Encrypted: | false |
SSDEEP: | 48:cvIwWl8zsBJg77aI9vD7EWpW8VYcYm8M4JwI2F+f+q8vPptwn4Id:uIjfTI7Fp7VsJwGfKBSn4Id |
MD5: | 7604105388109DEB7C1FFC14AC49007E |
SHA1: | 54C0B260E26E4111ECFA4E9A1A099069E44012F9 |
SHA-256: | 350FEBD032A843CEBA45352E80B5D08F1906A60D2666BAB2B86B0051F769A8AE |
SHA-512: | 57D2EE6B2F510724A887CA8EDC8920752A4A646BE9C3D70D2BDF19E3D88F3711295C818977D16014E1A996F5513B310E2E9FB6058341446E2CDD8DBEAEF69033 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\PASS-1234.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 442880 |
Entropy (8bit): | 7.120845466043454 |
Encrypted: | false |
SSDEEP: | 6144:YCBQRUrXgU86ZwW+G3QmRtaAnrZwyBwnB9yEwQe37zgg8u5W:vBRgU86D+vugSwywn3aH75W |
MD5: | DB9FA73B991DCA9E4BC648F0943D5FC2 |
SHA1: | 856E36EC4C04B47D5072DCA1965FC79F8030BD77 |
SHA-256: | 1ADF7A2EA992D38467E1170451445D5492FA5C8D00C8D62776281C61393910C4 |
SHA-512: | 32C390A7D02263BD661B6D3D7BA2B3B6E59BFD9BE0E2D46F4CB3F916A79233057C0A2180C2A2689C585C5424EEAE5C3156A3154151B76FF75ECB4580D704B294 |
Malicious: | true |
Antivirus: |
|
Reputation: | low |
Preview: |
Process: | C:\Windows\SysWOW64\WerFault.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1835008 |
Entropy (8bit): | 4.468788450702494 |
Encrypted: | false |
SSDEEP: | 6144:czZfpi6ceLPx9skLmb0fPZWSP3aJG8nAgeiJRMMhA2zX4WABluuNojDH5S:iZHtPZWOKnMM6bFpuj4 |
MD5: | 0F05ECC39271234EC0FFF5D2EF06D370 |
SHA1: | 557F5F8FAD3740732C121C5C42527B05F51DB47F |
SHA-256: | E8E893EBE12CAC704F9A5711891A659A45F5346735F0A028E92907EB62CD627A |
SHA-512: | 5E8104F97F5800465A07A1F6DEC5545265C5887EE225E1D119C9F1528F9DC624094D5DD11A698E8DF02126370989A8C57C6C13E5D2F58F863BBC16EE6A29E356 |
Malicious: | false |
Reputation: | low |
Preview: |
Process: | C:\Users\user\Desktop\PASS-1234.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 1415 |
Entropy (8bit): | 4.534460721917906 |
Encrypted: | false |
SSDEEP: | 24:7v74NuVMvXIUn2p/kpgw4r22Drrb2nknlusDp:7T4EMff2p8p14nrPKktp |
MD5: | E1192DC383FB3C1F3356A5D5D58D2E93 |
SHA1: | D3BC6886D9BBA939DB0F3B94405B3FFAE845AF6F |
SHA-256: | 2B4C0FE835D8CEE104858536B6B526C49A820D8228499EFF9454359ED24A3C37 |
SHA-512: | BDA9F7F2D40F79BF41C625467C5B65BB908901B3D3DE989F4A55B33380989B8FC8B8DA0765C434B7150BAD3001FE6DB735DB12209468669B1CE9AC5FB15A7B02 |
Malicious: | false |
Preview: |
File type: | |
Entropy (8bit): | 7.642427017875631 |
TrID: |
|
File name: | PASS-1234.exe |
File size: | 761'856 bytes |
MD5: | cf15f3e3576d512cf0696d4035212451 |
SHA1: | b9d2ae2405dbd77d4d6c226589990872319f98ce |
SHA256: | 3114e7c13f6545c7cb73343fbcb4ec4b0648751091d796f7923b17818603fb36 |
SHA512: | 2b1d8a5a5f24768c6a733af9393376e533958719de452f34d88496f98cc600efc7ab94e57a23e57326d4106e978a5a24721ee633d1e498dedc6c9e949a0a83c8 |
SSDEEP: | 12288:J8t1vT9z4WJ7lM3us92O7naDBKKnTur1AOy56/NlbFLJkG3Oa4j3cEsjp2LMVmAL:J45zzBi96Djo1QU/rFLS4Src |
TLSH: | E5F44A9C726072DFC867D472DEA82C68FA6174BB931F4217A02716AD9E0D897CF150F2 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....sg..............0.............. ... ... ....@.. .......................@............@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4c200a |
Entrypoint Section: | |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows cui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x6773E6B9 [Tue Dec 31 12:42:33 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | f34d5f2d4577ed6d9ceec516c1f5a744 |
Instruction |
---|
jmp dword ptr [004C2000h] |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
add byte ptr [eax], al |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x9274c | 0x4f | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xbe000 | 0x620 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xc0000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xc2000 | 0x8 | |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x92000 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
C;FTo | 0x2000 | 0x8e3a4 | 0x8e400 | 41c5f07a071f717348063b41ba374baf | False | 1.0003192278119508 | data | 7.999702756897987 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.text | 0x92000 | 0x2aad0 | 0x2ac00 | 51fa688b02d098fc5ca64330fee57d0b | False | 0.3164804915935672 | data | 4.6017567715327985 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xbe000 | 0x620 | 0x800 | f8a57bb5b4871395e61edfad4a51a674 | False | 0.35595703125 | data | 3.5124491312401203 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xc0000 | 0xc | 0x200 | f49806f5a4d3af8de38be4272fdc1bfe | False | 0.044921875 | data | 0.09262353601004472 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
0xc2000 | 0x10 | 0x200 | 6740637d846e5e93ae64944cc2f88318 | False | 0.044921875 | data | 0.14263576814887827 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_VERSION | 0xbe0a0 | 0x394 | OpenPGP Secret Key | 0.45414847161572053 | ||
RT_MANIFEST | 0xbe434 | 0x1ea | XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators | 0.5489795918367347 |
DLL | Import |
---|---|
mscoree.dll | _CorExeMain |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2024-12-31T17:39:14.247349+0100 | 2058550 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (undesirabkel .click) | 1 | 192.168.2.6 | 50384 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:39:14.786997+0100 | 2058551 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (undesirabkel .click in TLS SNI) | 1 | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:39:14.786997+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:39:46.220798+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:39:46.220798+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | TCP |
2024-12-31T17:39:46.244581+0100 | 2058616 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (nearycrepso .shop) | 1 | 192.168.2.6 | 57616 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:39:46.331181+0100 | 2058598 | ET MALWARE Win32/Lumma Stealer Related CnC Domain in DNS Lookup (abruptyopsn .shop) | 1 | 192.168.2.6 | 57016 | 1.1.1.1 | 53 | UDP |
2024-12-31T17:39:46.812877+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:39:46.812877+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:07.873836+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:07.873836+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.343881+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.343881+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.799774+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:08.799774+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:09.507842+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:09.507842+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:10.010366+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:10.734503+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49989 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:10.734503+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49989 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:11.944071+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49990 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:11.944071+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49990 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:13.518980+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49991 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:13.518980+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49991 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:16.683127+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49992 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:16.683127+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49992 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:18.160408+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49993 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:18.160408+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49993 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.336200+0100 | 2058599 | ET MALWARE Observed Win32/Lumma Stealer Related Domain (abruptyopsn .shop in TLS SNI) | 1 | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.336200+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
2024-12-31T17:40:21.794131+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:39:14.299583912 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:14.299633980 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:14.299724102 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:14.303783894 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:14.303797960 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:14.786921978 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:14.786997080 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:14.825481892 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:14.825505972 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:14.825853109 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:14.875792027 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:15.799333096 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:15.799352884 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:15.799484968 CET | 443 | 49709 | 188.114.97.3 | 192.168.2.6 |
Dec 31, 2024 17:39:46.220010042 CET | 49709 | 443 | 192.168.2.6 | 188.114.97.3 |
Dec 31, 2024 17:39:46.341721058 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.341758966 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.341933012 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.342410088 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.342423916 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.812777042 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.812876940 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.814454079 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.814469099 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.814708948 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.824876070 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.824876070 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:39:46.824956894 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.873836994 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.873944044 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.874030113 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.875411034 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.875432968 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.875444889 CET | 49898 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.875461102 CET | 443 | 49898 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.885900021 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.885950089 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:07.886059046 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.886385918 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:07.886401892 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.343621016 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.343880892 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.345789909 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.345797062 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.346203089 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.347548008 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.347572088 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.347625017 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799804926 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799859047 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799891949 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799892902 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.799920082 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799959898 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.799964905 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.799973965 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.800031900 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.800381899 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.800450087 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.800484896 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.800484896 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.800496101 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.800529003 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.800534964 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.801140070 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.801173925 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.801181078 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.844398975 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886297941 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886354923 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886382103 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886406898 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886424065 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886461973 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886471033 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886522055 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886558056 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886836052 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886848927 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:08.886862040 CET | 49986 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:08.886867046 CET | 443 | 49986 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.052171946 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.052234888 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.052304029 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.052659988 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.052671909 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.507761955 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.507842064 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.509182930 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.509196997 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.509512901 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:09.510802031 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.510977030 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:09.511019945 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.010354042 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.010452032 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.010560989 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.010770082 CET | 49988 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.010790110 CET | 443 | 49988 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.236289024 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.236346960 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.236433029 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.236787081 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.236800909 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.734255075 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.734503031 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.736303091 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.736313105 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.737426996 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.738775969 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.739008904 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.739042997 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:10.739101887 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:10.783329010 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.254245043 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.254379988 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.254479885 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.254679918 CET | 49989 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.254693985 CET | 443 | 49989 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.473458052 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.473517895 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.473603010 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.473942041 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.473958969 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.943928003 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.944071054 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.945420027 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.945436954 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.945678949 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.946904898 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.947051048 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.947084904 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:11.947154045 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:11.947164059 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:12.571788073 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:12.571897984 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:12.571980000 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:12.572299957 CET | 49990 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:12.572316885 CET | 443 | 49990 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.052015066 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.052059889 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.052134037 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.052464962 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.052476883 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.518884897 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.518980026 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.520432949 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.520438910 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.520667076 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.521966934 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.522826910 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.522845984 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.522947073 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.522964001 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523071051 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523113012 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523245096 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523262978 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523431063 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523451090 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523600101 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523617983 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523629904 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523638964 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523762941 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523782015 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.523890018 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.523999929 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.524023056 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533394098 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533548117 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533569098 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533580065 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533593893 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533612967 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533621073 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533641100 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533649921 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533700943 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533715010 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:13.533766031 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:13.533775091 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.087980032 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.088069916 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.088143110 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.088366032 CET | 49991 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.088382959 CET | 443 | 49991 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.225975037 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.226008892 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.226330996 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.226445913 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.226450920 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.682997942 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.683126926 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.684710026 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.684717894 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.684947014 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:16.686331034 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.686419010 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:16.686424971 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:17.146128893 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:17.146229029 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:17.146310091 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:17.146616936 CET | 49992 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:17.146630049 CET | 443 | 49992 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:17.692053080 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:17.692116022 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:17.692251921 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:17.692656040 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:17.692673922 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.160321951 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.160408020 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.162024021 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.162039995 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.162266970 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.182149887 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.182915926 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.182960987 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.183073044 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.183100939 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.183244944 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.183284044 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.183475018 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.183506012 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.185506105 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.185542107 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.191556931 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.191595078 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.191608906 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.191625118 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.191827059 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.191848993 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.191879034 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.193085909 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.193281889 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.193319082 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.193344116 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.193375111 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.195450068 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.195487976 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.198009968 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:18.198101044 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:18.198123932 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:20.847961903 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:20.848071098 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:20.848160982 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:20.848392010 CET | 49993 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:20.848412991 CET | 443 | 49993 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:20.858953953 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:20.858985901 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:20.859091997 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:20.859460115 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:20.859467030 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.336060047 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.336199999 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.337666035 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.337673903 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.337901115 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.339247942 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.339274883 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.339329004 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794138908 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794184923 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794219017 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794245005 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794270039 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794287920 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794287920 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794305086 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794342995 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794348955 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794395924 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794431925 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794437885 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794703007 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794733047 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794749975 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794754982 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794786930 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.794790983 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794866085 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.794905901 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.795150995 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.795161963 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Dec 31, 2024 17:40:21.795172930 CET | 49994 | 443 | 192.168.2.6 | 104.21.96.1 |
Dec 31, 2024 17:40:21.795177937 CET | 443 | 49994 | 104.21.96.1 | 192.168.2.6 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Dec 31, 2024 17:39:14.247349024 CET | 50384 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 31, 2024 17:39:14.270442963 CET | 53 | 50384 | 1.1.1.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.244580984 CET | 57616 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 31, 2024 17:39:46.327467918 CET | 53 | 57616 | 1.1.1.1 | 192.168.2.6 |
Dec 31, 2024 17:39:46.331181049 CET | 57016 | 53 | 192.168.2.6 | 1.1.1.1 |
Dec 31, 2024 17:39:46.340868950 CET | 53 | 57016 | 1.1.1.1 | 192.168.2.6 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:39:14.247349024 CET | 192.168.2.6 | 1.1.1.1 | 0x9096 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 31, 2024 17:39:46.244580984 CET | 192.168.2.6 | 1.1.1.1 | 0x8d65 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Dec 31, 2024 17:39:46.331181049 CET | 192.168.2.6 | 1.1.1.1 | 0x1de4 | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Dec 31, 2024 17:39:14.270442963 CET | 1.1.1.1 | 192.168.2.6 | 0x9096 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:14.270442963 CET | 1.1.1.1 | 192.168.2.6 | 0x9096 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.327467918 CET | 1.1.1.1 | 192.168.2.6 | 0x8d65 | Name error (3) | none | none | A (IP address) | IN (0x0001) | false | |
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.96.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.64.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.112.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.32.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.48.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.16.1 | A (IP address) | IN (0x0001) | false | ||
Dec 31, 2024 17:39:46.340868950 CET | 1.1.1.1 | 192.168.2.6 | 0x1de4 | No error (0) | 104.21.80.1 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.6 | 49709 | 188.114.97.3 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:39:15 UTC | 265 | OUT | |
2024-12-31 16:39:15 UTC | 8 | OUT |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.6 | 49898 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:39:46 UTC | 263 | OUT | |
2024-12-31 16:39:46 UTC | 8 | OUT | |
2024-12-31 16:40:07 UTC | 1123 | IN | |
2024-12-31 16:40:07 UTC | 7 | IN | |
2024-12-31 16:40:07 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.6 | 49986 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:08 UTC | 264 | OUT | |
2024-12-31 16:40:08 UTC | 54 | OUT | |
2024-12-31 16:40:08 UTC | 1121 | IN | |
2024-12-31 16:40:08 UTC | 248 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN | |
2024-12-31 16:40:08 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.6 | 49988 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:09 UTC | 275 | OUT | |
2024-12-31 16:40:09 UTC | 12824 | OUT | |
2024-12-31 16:40:10 UTC | 1127 | IN | |
2024-12-31 16:40:10 UTC | 20 | IN | |
2024-12-31 16:40:10 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.6 | 49989 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:10 UTC | 273 | OUT | |
2024-12-31 16:40:10 UTC | 15058 | OUT | |
2024-12-31 16:40:11 UTC | 1137 | IN | |
2024-12-31 16:40:11 UTC | 20 | IN | |
2024-12-31 16:40:11 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.6 | 49990 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:11 UTC | 278 | OUT | |
2024-12-31 16:40:11 UTC | 15331 | OUT | |
2024-12-31 16:40:11 UTC | 4615 | OUT | |
2024-12-31 16:40:12 UTC | 1127 | IN | |
2024-12-31 16:40:12 UTC | 20 | IN | |
2024-12-31 16:40:12 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.6 | 49991 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:13 UTC | 280 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:13 UTC | 15331 | OUT | |
2024-12-31 16:40:16 UTC | 1127 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.6 | 49992 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:16 UTC | 281 | OUT | |
2024-12-31 16:40:16 UTC | 1221 | OUT | |
2024-12-31 16:40:17 UTC | 1118 | IN | |
2024-12-31 16:40:17 UTC | 20 | IN | |
2024-12-31 16:40:17 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.6 | 49993 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:18 UTC | 282 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:18 UTC | 15331 | OUT | |
2024-12-31 16:40:20 UTC | 1131 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.6 | 49994 | 104.21.96.1 | 443 | 4512 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2024-12-31 16:40:21 UTC | 264 | OUT | |
2024-12-31 16:40:21 UTC | 89 | OUT | |
2024-12-31 16:40:21 UTC | 1127 | IN | |
2024-12-31 16:40:21 UTC | 242 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN | |
2024-12-31 16:40:21 UTC | 1369 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Click to jump to process
Target ID: | 0 |
Start time: | 11:39:12 |
Start date: | 31/12/2024 |
Path: | C:\Users\user\Desktop\PASS-1234.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xb90000 |
File size: | 761'856 bytes |
MD5 hash: | CF15F3E3576D512CF0696D4035212451 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Has exited: | true |
Target ID: | 1 |
Start time: | 11:39:12 |
Start date: | 31/12/2024 |
Path: | C:\Windows\System32\conhost.exe |
Wow64 process (32bit): | false |
Commandline: | |
Imagebase: | 0x7ff66e660000 |
File size: | 862'208 bytes |
MD5 hash: | 0D698AF330FD17BEE3BF90011D49251D |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | false |
Target ID: | 3 |
Start time: | 11:39:13 |
Start date: | 31/12/2024 |
Path: | C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x840000 |
File size: | 43'016 bytes |
MD5 hash: | 5D1D74198D75640E889F0A577BBF31FC |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | moderate |
Has exited: | false |
Target ID: | 6 |
Start time: | 11:39:13 |
Start date: | 31/12/2024 |
Path: | C:\Windows\SysWOW64\WerFault.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0xe20000 |
File size: | 483'680 bytes |
MD5 hash: | C31336C1EFC2CCB44B4326EA793040F2 |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | high |
Has exited: | true |
Execution Graph
Execution Coverage: | 9.7% |
Dynamic/Decrypted Code Coverage: | 0% |
Signature Coverage: | 14.2% |
Total number of Nodes: | 684 |
Total number of Limit Nodes: | 23 |
Graph
Function 6D387E40 Relevance: 101.6, APIs: 29, Strings: 25, Instructions: 7068nativethreadmemoryCOMMON
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D381930 Relevance: 55.3, APIs: 24, Strings: 6, Instructions: 2760filememoryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3863E0 Relevance: 15.0, APIs: 3, Strings: 5, Instructions: 992nativeCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D38FD31 Relevance: 3.1, APIs: 2, Instructions: 76COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D394B5D Relevance: 3.1, APIs: 2, Instructions: 67COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3953C0 Relevance: 3.1, APIs: 2, Instructions: 66COMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D393126 Relevance: 1.5, APIs: 1, Instructions: 39memoryCOMMONLIBRARYCODE
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3843A0 Relevance: 5.9, Strings: 3, Instructions: 2164COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D387220 Relevance: 5.9, Strings: 4, Instructions: 879COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE97E0 Relevance: 4.5, Strings: 3, Instructions: 787COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB5B60 Relevance: 3.3, Strings: 2, Instructions: 802COMMON
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D381000 Relevance: 1.9, Strings: 1, Instructions: 685COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3906E8 Relevance: 1.6, APIs: 1, Instructions: 144COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D393562 Relevance: 1.6, APIs: 1, Instructions: 140COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BCE940 Relevance: 1.5, Strings: 1, Instructions: 268COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B9D7F9 Relevance: 1.3, Strings: 1, Instructions: 83COMMON
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D394A8C Relevance: 1.3, APIs: 1, Instructions: 5memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB3E00 Relevance: .7, Instructions: 670COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7600 Relevance: .7, Instructions: 665COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB83F0 Relevance: .6, Instructions: 625COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB4820 Relevance: .6, Instructions: 600COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BD0590 Relevance: .6, Instructions: 580COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB6860 Relevance: .4, Instructions: 449COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BC5150 Relevance: .4, Instructions: 369COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BCEC10 Relevance: .3, Instructions: 337COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB7170 Relevance: .3, Instructions: 303COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BED110 Relevance: .2, Instructions: 226COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BCBDC0 Relevance: .2, Instructions: 209COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE8E10 Relevance: .2, Instructions: 189COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BCF330 Relevance: .2, Instructions: 177COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BC5E50 Relevance: .1, Instructions: 147COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BE9490 Relevance: .1, Instructions: 143COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B99C68 Relevance: .1, Instructions: 133COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B97668 Relevance: .1, Instructions: 89COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B985BA Relevance: .1, Instructions: 81COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00B99B3A Relevance: .1, Instructions: 54COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BB3A90 Relevance: .0, Instructions: 48COMMON
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D392E79 Relevance: .0, Instructions: 22COMMONLIBRARYCODE
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D392A43 Relevance: 15.1, APIs: 10, Instructions: 69COMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 00BDC690 Relevance: 11.5, Strings: 9, Instructions: 236COMMON
Control-flow Graph
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3946AA Relevance: 10.6, APIs: 4, Strings: 2, Instructions: 77COMMONLIBRARYCODE
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3914F7 Relevance: 9.1, APIs: 6, Instructions: 60COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D391673 Relevance: 8.8, APIs: 4, Strings: 1, Instructions: 62COMMONLIBRARYCODE
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D391D2A Relevance: 8.8, APIs: 3, Strings: 2, Instructions: 30libraryloaderCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D396347 Relevance: 7.7, APIs: 5, Instructions: 199COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3972BC Relevance: 7.2, APIs: 3, Strings: 1, Instructions: 170fileCOMMONLIBRARYCODE
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D393287 Relevance: 6.1, APIs: 4, Instructions: 86COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 6D3924B4 Relevance: 6.0, APIs: 4, Instructions: 19COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Execution Graph
Execution Coverage: | 9.9% |
Dynamic/Decrypted Code Coverage: | 100% |
Signature Coverage: | 22.9% |
Total number of Nodes: | 375 |
Total number of Limit Nodes: | 27 |
Graph
Function 031A88E0 Relevance: 25.3, APIs: 11, Strings: 3, Instructions: 787memorycomCOMMON
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 05711000 Relevance: 19.6, APIs: 13, Instructions: 81clipboardsleepmemoryCOMMON
Control-flow Graph
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031786D0 Relevance: 7.7, APIs: 5, Instructions: 212threadCOMMON
Control-flow Graph
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Control-flow Graph
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319C607 Relevance: 3.1, APIs: 2, Instructions: 95COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319C601 Relevance: 3.1, APIs: 2, Instructions: 83COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319E5EF Relevance: 1.6, APIs: 1, Instructions: 79COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031AD962 Relevance: 1.5, APIs: 1, Instructions: 30COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031AD810 Relevance: 1.5, APIs: 1, Instructions: 14libraryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0317CBF6 Relevance: 3.1, APIs: 2, Instructions: 120COMMON
APIs |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319C918 Relevance: 1.6, APIs: 1, Instructions: 81COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03183942 Relevance: 1.6, APIs: 1, Instructions: 60threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 03183798 Relevance: 1.6, APIs: 1, Instructions: 60threadCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031AD7A0 Relevance: 1.5, APIs: 1, Instructions: 45memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031A27A3 Relevance: 1.5, APIs: 1, Instructions: 27COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319EBBE Relevance: 1.5, APIs: 1, Instructions: 21COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031ABD90 Relevance: 1.5, APIs: 1, Instructions: 18memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0317CD97 Relevance: 1.5, APIs: 1, Instructions: 17COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031AD991 Relevance: 1.5, APIs: 1, Instructions: 15COMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031ABD70 Relevance: 1.5, APIs: 1, Instructions: 9memoryCOMMON
APIs |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 031A2FF0 Relevance: 12.4, APIs: 6, Strings: 1, Instructions: 136clipboardCOMMON
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Function 0319E196 Relevance: 8.9, APIs: 1, Strings: 4, Instructions: 146libraryCOMMON
APIs |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
Strings |
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|
APIs |
Strings |
|
Memory Dump Source |
|
|
Joe Sandbox IDA Plugin |
|
Similarity |
|