Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
- System is w10x64
- Setup.exe (PID: 6984 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: ABDA8CEA9C2D8BC35847D4D189F61F2E)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Lumma Stealer, LummaC2 Stealer | Lumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell. | No Attribution |
{"C2 url": ["framekgirus.shop", "tirepublicerj.shop", "noisycuttej.shop", "abruptyopsn.shop", "wholersorie.shop", "nearycrepso.shop", "locketsashayz.click", "cloudewahsj.shop", "rabidcowse.shop"], "Build id": "hRjzG3--TRON"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
Windows_Trojan_Donutloader_f40e3759 | unknown | unknown |
| |
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security | ||
Click to see the 2 entries |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:21.916765+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:23.166077+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:24.615969+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:25.800459+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:31.060448+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:33.202102+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:34.766559+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:36.458976+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:38.632283+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:39.907939+0100 | 2028371 | 3 | Unknown Traffic | 192.168.2.4 | 49745 | 185.161.251.21 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:22.676192+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:23.640646+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:39.103074+0100 | 2054653 | 1 | A Network Trojan was detected | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:22.676192+0100 | 2049836 | 1 | A Network Trojan was detected | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:23.640646+0100 | 2049812 | 1 | A Network Trojan was detected | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
Timestamp | SID | Severity | Classtype | Source IP | Source Port | Destination IP | Destination Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:35.522155+0100 | 2048094 | 1 | Malware Command and Control Activity Detected | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
Click to jump to signature section
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link |
Source: | Integrated Neural Analysis Model: |
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: | ||
Source: | String decryptor: |
Source: | Static PE information: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Directory queried: |
Networking |
---|
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: | ||
Source: | URLs: |
Source: | IP Address: | ||
Source: | IP Address: | ||
Source: | IP Address: |
Source: | ASN Name: |
Source: | JA3 fingerprint: |
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: | ||
Source: | Suricata IDS: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | HTTP traffic detected: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
System Summary |
---|
Source: | Matched rule: |
Source: | Process Stats: |
Source: | Code function: | 0_3_014AC7F8 | |
Source: | Code function: | 0_3_014AC7F8 | |
Source: | Code function: | 0_3_014AC7F8 | |
Source: | Code function: | 0_3_014AC7F8 |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Key opened: | Jump to behavior |
Source: | Binary or memory string: |
Source: | Virustotal: |
Source: | File read: | Jump to behavior |
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior | ||
Source: | Section loaded: | Jump to behavior |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: | 0_3_014A682F | |
Source: | Code function: | 0_3_014A682F | |
Source: | Code function: | 0_3_014A682F | |
Source: | Code function: | 0_3_014A682F |
Source: | Registry key monitored for changes: | Jump to behavior | ||
Source: | Registry key monitored for changes: | Jump to behavior |
Source: | Process information set: | Jump to behavior |
Malware Analysis System Evasion |
---|
Source: | WMI Queries: |
Source: | System information queried: | Jump to behavior |
Source: | Thread sleep time: | Jump to behavior |
Source: | WMI Queries: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: | Jump to behavior |
HIPS / PFW / Operating System Protection Evasion |
---|
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Queries volume information: | Jump to behavior |
Source: | Key value queried: | Jump to behavior |
Source: | Binary or memory string: |
Source: | WMI Queries: |
Stealing of Sensitive Information |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior | ||
Source: | File opened: | Jump to behavior |
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior | ||
Source: | Directory queried: | Jump to behavior |
Source: | Directory queried: |
Source: | File source: | ||
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: | ||
Source: | File source: | ||
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | 12 Windows Management Instrumentation | 1 DLL Side-Loading | 1 DLL Side-Loading | 21 Virtualization/Sandbox Evasion | 2 OS Credential Dumping | 1 Query Registry | Remote Services | 1 Archive Collected Data | 11 Encrypted Channel | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Credentials | Domains | Default Accounts | 1 PowerShell | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | 1 Deobfuscate/Decode Files or Information | LSASS Memory | 221 Security Software Discovery | Remote Desktop Protocol | 41 Data from Local System | 1 Ingress Tool Transfer | Exfiltration Over Bluetooth | Network Denial of Service |
Email Addresses | DNS Server | Domain Accounts | At | Logon Script (Windows) | Logon Script (Windows) | 1 Obfuscated Files or Information | Security Account Manager | 21 Virtualization/Sandbox Evasion | SMB/Windows Admin Shares | Data from Network Shared Drive | 3 Non-Application Layer Protocol | Automated Exfiltration | Data Encrypted for Impact |
Employee Names | Virtual Private Server | Local Accounts | Cron | Login Hook | Login Hook | 1 DLL Side-Loading | NTDS | 1 Process Discovery | Distributed Component Object Model | Input Capture | 114 Application Layer Protocol | Traffic Duplication | Data Destruction |
Gather Victim Network Information | Server | Cloud Accounts | Launchd | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | 2 File and Directory Discovery | SSH | Keylogging | Fallback Channels | Scheduled Transfer | Data Encrypted for Impact |
Domain Properties | Botnet | Replication Through Removable Media | Scheduled Task | RC Scripts | RC Scripts | Steganography | Cached Domain Credentials | 22 System Information Discovery | VNC | GUI Input Capture | Multiband Communication | Data Transfer Size Limits | Service Stop |
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
9% | Virustotal | Browse | ||
11% | ReversingLabs |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe | ||
100% | Avira URL Cloud | malware | ||
0% | Avira URL Cloud | safe | ||
0% | Avira URL Cloud | safe |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
cegu.shop | 185.161.251.21 | true | false | high | |
locketsashayz.click | 188.114.97.3 | true | true | unknown |
Name | Malicious | Antivirus Detection | Reputation |
---|---|---|---|
true |
| unknown | |
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
false | high | ||
true |
| unknown | |
false | high | ||
false | high | ||
false | high |
Name | Source | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false | high | |||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false | high | |||
false |
| unknown | ||
false |
| unknown | ||
false | high | |||
false | high | |||
false |
| unknown |
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
188.114.97.3 | locketsashayz.click | European Union | 13335 | CLOUDFLARENETUS | true | |
185.161.251.21 | cegu.shop | United Kingdom | 5089 | NTLGB | false |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1583039 |
Start date and time: | 2025-01-01 16:55:15 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 7m 46s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 5 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | Setup.exe |
Detection: | MAL |
Classification: | mal100.troj.spyw.evad.winEXE@1/0@2/2 |
EGA Information: | Failed |
HCA Information: |
|
Cookbook Comments: |
|
- Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
- Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
- Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
- Execution Graph export aborted for target Setup.exe, PID 6984 because there are no executed function
- Not all processes where analyzed, report is missing behavior information
- Report size getting too big, too many NtOpenKeyEx calls found.
- Report size getting too big, too many NtQueryDirectoryFile calls found.
- Report size getting too big, too many NtQueryValueKey calls found.
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
Time | Type | Description |
---|---|---|
10:56:21 | API Interceptor |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
188.114.97.3 | Get hash | malicious | FormBook | Browse |
| |
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | FormBook | Browse |
| ||
Get hash | malicious | Snake Keylogger | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Ducktail | Browse |
| ||
185.161.251.21 | Get hash | malicious | LummaC Stealer | Browse | ||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC | Browse | |||
Get hash | malicious | LummaC Stealer | Browse |
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
cegu.shop | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
locketsashayz.click | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
CLOUDFLARENETUS | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | DCRat, PureLog Stealer, zgRAT | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
NTLGB | Get hash | malicious | LummaC Stealer | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | Mirai | Browse |
|
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
a0e9f5d64349fb13191bc781f81f42e1 | Get hash | malicious | LummaC | Browse |
| |
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC Stealer | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
| ||
Get hash | malicious | LummaC | Browse |
|
File type: | |
Entropy (8bit): | 0.3892449133522304 |
TrID: |
|
File name: | Setup.exe |
File size: | 74'880'677 bytes |
MD5: | abda8cea9c2d8bc35847d4d189f61f2e |
SHA1: | ce38f933a30778130b53792109531056dfe7c03c |
SHA256: | 844b0fdfa66fd6d10179b74ae064c30624581a833bf1eb759e03fd2c664bae03 |
SHA512: | 054036d0f81216efb7e0469abf62cbb3cdd06406b6a25778d6a1557bf8774f7f27d97e5bb9513b54a4f9a7cd8da1cab3e8bf2630e686f71454c0ff54f566cab4 |
SSDEEP: | 12288:c9YadW8cfnpp2pd9VvvCbs492tkIMi88hmXF8hMvW+I8uwqPwc7X2BoA/yW93BnY:MdW88nTb92LMX8oXF8hBgqYcJ |
TLSH: | 90F70832D720A9F0578B44DFC522DAE9D5BE6B03132298F7514B39C7E98B4D8433AC69 |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......=(JeyI$6yI$6yI$6p1.6iI$6+! 7uI$6+!'7}I$6+!!7fI$6+!%7}I$6.-%7pI$6yI%6.I$6. 7cI$6. -7sI$6. .6xI$6. &7xI$6RichyI$6............... |
Icon Hash: | 90cececece8e8eb0 |
Entrypoint: | 0x4267ce |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE |
Time Stamp: | 0x66BAEAF9 [Tue Aug 13 05:11:21 2024 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 1027691d74412499ffdeec8b7ed717af |
Signature Valid: | false |
Signature Issuer: | CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, S=Washington, C=US |
Signature Validation Error: | The digital signature of the object did not verify |
Error Number: | -2146869232 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 4068B1B0494EFA79F5A751DCCA8111CD |
Thumbprint SHA-1: | 914A09C2E02C696AF394048BCB8D95449BCD5B9E |
Thumbprint SHA-256: | 4A838904E732A380E2856A9D6FEE926E5C57EB59336292AC5D9E47C9B2C1ED13 |
Serial: | 33000003DFFB6AE3F427ECB6A30000000003DF |
Instruction |
---|
call 00007F75E8F03E6Dh |
jmp 00007F75E8F03599h |
push ebp |
mov ebp, esp |
push 00000000h |
call dword ptr [0042908Ch] |
push dword ptr [ebp+08h] |
call dword ptr [00429088h] |
push C0000409h |
call dword ptr [00429090h] |
push eax |
call dword ptr [00429094h] |
pop ebp |
ret |
push ebp |
mov ebp, esp |
sub esp, 00000324h |
push 00000017h |
call 00007F75E8F04010h |
test eax, eax |
je 00007F75E8F03727h |
push 00000002h |
pop ecx |
int 29h |
mov dword ptr [0042F678h], eax |
mov dword ptr [0042F674h], ecx |
mov dword ptr [0042F670h], edx |
mov dword ptr [0042F66Ch], ebx |
mov dword ptr [0042F668h], esi |
mov dword ptr [0042F664h], edi |
mov word ptr [0042F690h], ss |
mov word ptr [0042F684h], cs |
mov word ptr [0042F660h], ds |
mov word ptr [0042F65Ch], es |
mov word ptr [0042F658h], fs |
mov word ptr [0042F654h], gs |
pushfd |
pop dword ptr [0042F688h] |
mov eax, dword ptr [ebp+00h] |
mov dword ptr [0042F67Ch], eax |
mov eax, dword ptr [ebp+04h] |
mov dword ptr [0042F680h], eax |
lea eax, dword ptr [ebp+08h] |
mov dword ptr [0042F68Ch], eax |
mov eax, dword ptr [ebp-00000324h] |
mov dword ptr [0042F5C8h], 00010001h |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x2c824 | 0x12c | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x31000 | 0x1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x47674d5 | 0x21d0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x32000 | 0x140c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x2acc0 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x2add0 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x2ad30 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x29000 | 0x240 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x27481 | 0x27600 | 47f72ae360dd3c78303465b05e680715 | False | 0.49032118055555557 | data | 6.585884608495068 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rdata | 0x29000 | 0x465c | 0x4800 | ed312862ecd77389c22fa4661daddd30 | False | 0.3819986979166667 | data | 4.747279151971027 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x2e000 | 0x2128 | 0x1600 | 15ecf71cb8ad22f220fe3a08232e5b97 | False | 0.3643465909090909 | data | 4.901400366248305 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE |
.rsrc | 0x31000 | 0x1e0 | 0x200 | ad7b78e84f1d02fc883315380c423021 | False | 0.529296875 | data | 4.7176788329467545 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x32000 | 0x52000 | 0x52000 | eab2e80fdb41a271c56495e0eface1a1 | False | 0.6910043111661586 | data | 7.576542253916384 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country | ZLIB Complexity |
---|---|---|---|---|---|---|
RT_MANIFEST | 0x31060 | 0x17d | XML 1.0 document, ASCII text, with CRLF line terminators | English | United States | 0.5931758530183727 |
DLL | Import |
---|---|
KERNEL32.dll | DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, UnmapViewOfFile, CreateFileMappingA, MapViewOfFile, CreateEventA, GetExitCodeThread, SetEvent, ResetEvent, Sleep, CreateToolhelp32Snapshot, Process32Next, WaitForMultipleObjects, GetModuleFileNameA, GetPrivateProfileIntA, LoadLibraryA, GetProcAddress, FreeLibrary, InitializeCriticalSection, GetModuleFileNameW, CreateProcessW, GetExitCodeProcess, GetTickCount, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, QueryPerformanceCounter, GetCurrentProcessId, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, WaitForSingleObject, CloseHandle, CreateThread, ReleaseMutex, CreateMutexA, MultiByteToWideChar, SetErrorMode |
USER32.dll | FindWindowExA, LoadIconA, LoadCursorA, RegisterClassExA, CreateWindowExA, ShowWindow, UpdateWindow, GetMessageA, TranslateMessage, DispatchMessageA, DestroyWindow, PostQuitMessage, DefWindowProcA, SendMessageA, PostMessageA |
GDI32.dll | GetStockObject |
ADVAPI32.dll | RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegSetValueExW |
MSVCP140.dll | ?_Xout_of_range@std@@YAXPBD@Z, ?_Xlength_error@std@@YAXPBD@Z |
VCRUNTIME140.dll | memmove, _except_handler4_common, _CxxThrowException, __std_exception_destroy, __std_exception_copy, memcpy, memset, wcsrchr, longjmp, _purecall, __CxxFrameHandler3, _setjmp3 |
api-ms-win-crt-runtime-l1-1-0.dll | _crt_atexit, _initialize_onexit_table, _cexit, _configure_narrow_argv, _set_app_type, _register_onexit_function, _get_initial_narrow_environment, _initterm, _initterm_e, _exit, _register_thread_local_exe_atexit_callback, __p___argc, __p___argv, _c_exit, _initialize_narrow_environment, _invalid_parameter_noinfo, exit, terminate, _controlfp_s, _errno, _invalid_parameter_noinfo_noreturn, _seh_filter_exe |
api-ms-win-crt-stdio-l1-1-0.dll | __p__commode, fwrite, __stdio_common_vsscanf, ftell, fseek, __stdio_common_vsprintf, _wfopen_s, __stdio_common_vsprintf_s, __stdio_common_vswprintf_s, fclose, __acrt_iob_func, _set_fmode, __stdio_common_vfprintf, fread_s |
api-ms-win-crt-filesystem-l1-1-0.dll | _splitpath_s, _wsplitpath_s |
api-ms-win-crt-string-l1-1-0.dll | strncmp, _strnicmp, toupper, strncpy, _wcsicmp |
api-ms-win-crt-environment-l1-1-0.dll | getenv |
api-ms-win-crt-heap-l1-1-0.dll | _callnewh, free, malloc, _set_new_mode |
api-ms-win-crt-math-l1-1-0.dll | __setusermatherr |
api-ms-win-crt-locale-l1-1-0.dll | _configthreadlocale |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Timestamp | SID | Signature | Severity | Source IP | Source Port | Dest IP | Dest Port | Protocol |
---|---|---|---|---|---|---|---|---|
2025-01-01T16:56:21.916765+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:22.676192+0100 | 2049836 | ET MALWARE Lumma Stealer Related Activity | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:22.676192+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:23.166077+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:23.640646+0100 | 2049812 | ET MALWARE Lumma Stealer Related Activity M2 | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:23.640646+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:24.615969+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:25.800459+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:31.060448+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:33.202102+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:34.766559+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:35.522155+0100 | 2048094 | ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration | 1 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:36.458976+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:38.632283+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:39.103074+0100 | 2054653 | ET MALWARE Lumma Stealer CnC Host Checkin | 1 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | TCP |
2025-01-01T16:56:39.907939+0100 | 2028371 | ET JA3 Hash - Possible Malware - Fake Firefox Font Update | 3 | 192.168.2.4 | 49745 | 185.161.251.21 | 443 | TCP |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 16:56:21.441757917 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.441796064 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:21.442115068 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.444853067 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.444871902 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:21.916558981 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:21.916764975 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.920741081 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.920764923 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:21.921097040 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:21.970078945 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.970118999 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:21.970231056 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:22.676179886 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:22.676264048 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:22.676429033 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:22.678301096 CET | 49730 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:22.678323030 CET | 443 | 49730 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:22.688311100 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:22.688358068 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:22.688431978 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:22.688901901 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:22.688913107 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.165998936 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.166076899 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.167455912 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.167467117 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.167730093 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.168962002 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.168996096 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.169044018 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640625954 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640708923 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640743971 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640765905 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.640778065 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640800953 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640819073 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.640836954 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.640892029 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.640897989 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.641078949 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.641122103 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.641127110 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.645314932 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.645345926 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.645363092 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.645370007 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.645417929 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.731071949 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.731132030 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.731158972 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.731184006 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.731209040 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.731256008 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.767720938 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.767838001 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.767895937 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.768784046 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.768810987 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:23.768825054 CET | 49731 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:23.768830061 CET | 443 | 49731 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.155690908 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.155740976 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.156992912 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.160866976 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.160883904 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.615832090 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.615968943 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.618133068 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.618143082 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.618347883 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.619719982 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.619719982 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.619754076 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:24.619857073 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:24.619863033 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.248749018 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.248827934 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.248886108 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.249126911 CET | 49732 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.249147892 CET | 443 | 49732 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.342849970 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.342890978 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.342969894 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.343291044 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.343310118 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.800389051 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.800458908 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.801732063 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.801748037 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.802006960 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:25.803320885 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.803370953 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:25.803407907 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:30.386774063 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:30.386863947 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:30.386907101 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:30.387149096 CET | 49735 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:30.387176037 CET | 443 | 49735 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:30.603182077 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:30.603245974 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:30.603323936 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:30.603598118 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:30.603609085 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.060374975 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.060447931 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.061857939 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.061870098 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.062127113 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.070656061 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.070820093 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.070842981 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.070903063 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.070910931 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.709590912 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.709676981 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:31.709887981 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.710131884 CET | 49740 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:31.710148096 CET | 443 | 49740 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:32.736170053 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:32.736217022 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:32.736284971 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:32.736669064 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:32.736677885 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:33.202022076 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:33.202101946 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:33.210484028 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:33.210495949 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:33.210813999 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:33.211906910 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:33.212054014 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:33.212070942 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.097760916 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.097846031 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.097919941 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.098086119 CET | 49741 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.098107100 CET | 443 | 49741 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.232173920 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.232229948 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.232312918 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.232589960 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.232604027 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.766465902 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.766558886 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.802192926 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.802227974 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.802531004 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:34.811588049 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.811656952 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:34.811666012 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:35.522154093 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:35.522244930 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:35.522294044 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:35.522433043 CET | 49742 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:35.522452116 CET | 443 | 49742 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:35.972893953 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:35.972953081 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:35.973356962 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:35.973356962 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:35.973402977 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.458833933 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.458976030 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.460387945 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.460405111 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.460622072 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.462723017 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.462723017 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.462770939 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.463514090 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.463553905 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.464538097 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.464585066 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.464915991 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.464955091 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.465275049 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465307951 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.465466976 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465495110 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.465503931 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465516090 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.465692043 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465715885 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.465740919 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465909958 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.465939045 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.473650932 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.477093935 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.477129936 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:36.477157116 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.477194071 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.477353096 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:36.478533030 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.124366045 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.124465942 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.125014067 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.125190973 CET | 49743 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.125211954 CET | 443 | 49743 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.156989098 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.157049894 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.157289982 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.157668114 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.157684088 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.632189035 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.632282972 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.633755922 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.633766890 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.633970022 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:38.635232925 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.635246992 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:38.635288954 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:39.103025913 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:39.103115082 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:39.103177071 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:39.103404045 CET | 49744 | 443 | 192.168.2.4 | 188.114.97.3 |
Jan 1, 2025 16:56:39.103426933 CET | 443 | 49744 | 188.114.97.3 | 192.168.2.4 |
Jan 1, 2025 16:56:39.166307926 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.166347980 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:39.166580915 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.168109894 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.168119907 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:39.907763958 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:39.907938957 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.913368940 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.913378000 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:39.913681984 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:39.916039944 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:39.963340044 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:40.175007105 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:40.175081968 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:40.175262928 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:40.175537109 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:40.175558090 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Jan 1, 2025 16:56:40.175575018 CET | 49745 | 443 | 192.168.2.4 | 185.161.251.21 |
Jan 1, 2025 16:56:40.175580978 CET | 443 | 49745 | 185.161.251.21 | 192.168.2.4 |
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Jan 1, 2025 16:56:21.423703909 CET | 56860 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 1, 2025 16:56:21.436892986 CET | 53 | 56860 | 1.1.1.1 | 192.168.2.4 |
Jan 1, 2025 16:56:39.105029106 CET | 61073 | 53 | 192.168.2.4 | 1.1.1.1 |
Jan 1, 2025 16:56:39.164027929 CET | 53 | 61073 | 1.1.1.1 | 192.168.2.4 |
Timestamp | Source IP | Dest IP | Trans ID | OP Code | Name | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|
Jan 1, 2025 16:56:21.423703909 CET | 192.168.2.4 | 1.1.1.1 | 0x4f54 | Standard query (0) | A (IP address) | IN (0x0001) | false | |
Jan 1, 2025 16:56:39.105029106 CET | 192.168.2.4 | 1.1.1.1 | 0xcf4c | Standard query (0) | A (IP address) | IN (0x0001) | false |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Jan 1, 2025 16:56:21.436892986 CET | 1.1.1.1 | 192.168.2.4 | 0x4f54 | No error (0) | 188.114.97.3 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 16:56:21.436892986 CET | 1.1.1.1 | 192.168.2.4 | 0x4f54 | No error (0) | 188.114.96.3 | A (IP address) | IN (0x0001) | false | ||
Jan 1, 2025 16:56:39.164027929 CET | 1.1.1.1 | 192.168.2.4 | 0xcf4c | No error (0) | 185.161.251.21 | A (IP address) | IN (0x0001) | false |
|
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
0 | 192.168.2.4 | 49730 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:21 UTC | 266 | OUT | |
2025-01-01 15:56:21 UTC | 8 | OUT | |
2025-01-01 15:56:22 UTC | 1125 | IN | |
2025-01-01 15:56:22 UTC | 7 | IN | |
2025-01-01 15:56:22 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
1 | 192.168.2.4 | 49731 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:23 UTC | 267 | OUT | |
2025-01-01 15:56:23 UTC | 78 | OUT | |
2025-01-01 15:56:23 UTC | 1127 | IN | |
2025-01-01 15:56:23 UTC | 242 | IN | |
2025-01-01 15:56:23 UTC | 893 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN | |
2025-01-01 15:56:23 UTC | 1369 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
2 | 192.168.2.4 | 49732 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:24 UTC | 275 | OUT | |
2025-01-01 15:56:24 UTC | 15331 | OUT | |
2025-01-01 15:56:24 UTC | 2771 | OUT | |
2025-01-01 15:56:25 UTC | 1140 | IN | |
2025-01-01 15:56:25 UTC | 20 | IN | |
2025-01-01 15:56:25 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
3 | 192.168.2.4 | 49735 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:25 UTC | 278 | OUT | |
2025-01-01 15:56:25 UTC | 8747 | OUT | |
2025-01-01 15:56:30 UTC | 1128 | IN | |
2025-01-01 15:56:30 UTC | 20 | IN | |
2025-01-01 15:56:30 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
4 | 192.168.2.4 | 49740 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:31 UTC | 277 | OUT | |
2025-01-01 15:56:31 UTC | 15331 | OUT | |
2025-01-01 15:56:31 UTC | 5057 | OUT | |
2025-01-01 15:56:31 UTC | 1129 | IN | |
2025-01-01 15:56:31 UTC | 20 | IN | |
2025-01-01 15:56:31 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
5 | 192.168.2.4 | 49741 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:33 UTC | 277 | OUT | |
2025-01-01 15:56:33 UTC | 3779 | OUT | |
2025-01-01 15:56:34 UTC | 1137 | IN | |
2025-01-01 15:56:34 UTC | 20 | IN | |
2025-01-01 15:56:34 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
6 | 192.168.2.4 | 49742 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:34 UTC | 274 | OUT | |
2025-01-01 15:56:34 UTC | 1204 | OUT | |
2025-01-01 15:56:35 UTC | 1133 | IN | |
2025-01-01 15:56:35 UTC | 20 | IN | |
2025-01-01 15:56:35 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
7 | 192.168.2.4 | 49743 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:36 UTC | 276 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:36 UTC | 15331 | OUT | |
2025-01-01 15:56:38 UTC | 1139 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
8 | 192.168.2.4 | 49744 | 188.114.97.3 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:38 UTC | 268 | OUT | |
2025-01-01 15:56:38 UTC | 113 | OUT | |
2025-01-01 15:56:39 UTC | 1124 | IN | |
2025-01-01 15:56:39 UTC | 218 | IN | |
2025-01-01 15:56:39 UTC | 5 | IN |
Session ID | Source IP | Source Port | Destination IP | Destination Port | PID | Process |
---|---|---|---|---|---|---|
9 | 192.168.2.4 | 49745 | 185.161.251.21 | 443 | 6984 | C:\Users\user\Desktop\Setup.exe |
Timestamp | Bytes transferred | Direction | Data |
---|---|---|---|
2025-01-01 15:56:39 UTC | 201 | OUT | |
2025-01-01 15:56:40 UTC | 249 | IN | |
2025-01-01 15:56:40 UTC | 329 | IN |
Click to jump to process
Click to jump to process
back
Click to dive into process behavior distribution
Target ID: | 0 |
Start time: | 10:56:06 |
Start date: | 01/01/2025 |
Path: | C:\Users\user\Desktop\Setup.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x450000 |
File size: | 74'880'677 bytes |
MD5 hash: | ABDA8CEA9C2D8BC35847D4D189F61F2E |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Yara matches: |
|
Reputation: | low |
Has exited: | false |
Function 014AC7F8 Relevance: .1, Instructions: 68COMMON
Memory Dump Source |
|
Joe Sandbox IDA Plugin |
|
Yara matches |
Similarity |
|